Join the discussion
Question 1/82
The SAP HANA database is installed with multi database container (MDC) mode with multiple tenant databases configured. What are the required activities to enable access between tenants? Note: There are 2 correct answers to this question.
Correct Answer: A,D
Add Comments
- Other Question (82q)
- Q1. The SAP HANA database is installed with multi database container (MDC) mode with multiple ...
- Q2. You want to create an SAP Fiori app for multiple users and multiple back-end systems. To s...
- Q3. How can you protect a table containing sensitive data using the authorization object S_TAB...
- Q4. Which authorization object controls access to the trusting system between the managed syst...
- Q5. SNC is configured in the production system. For emergency purposes, you want to allow cert...
- Q6. What are the characteristics of HTTP security session management? Note: There are 3 correc...
- Q7. To prevent session fixation and session hijacking attacks, SAP's HTTP security session man...
- Q8. SAP GRC Access Control provides risk analysis for which of the following? Note: There are ...
- Q9. You want to allow your trainee colleagues to use the SAP GUI to connect directly to your S...
- Q10. How can you describe the hierarchical relationships between technical entities in the Clou...
- Q11. What are characteristic of the SAP_INTERNAL_HANA_SUPPORT catalog role? Note: there are 2 c...
- Q12. How can you protect a table containing sensitive data using the authorization object S_TAB...
- Q13. What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: ...
- Q14. What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note:...
- Q15. Which of the following programs can be used to enable ALE Audit using the ALEAUD message t...
- Q16. You have created an RFC destination with a registered external RFC server program. When yo...
- Q17. Which features does SAProuter provide? Note: There are 2 correct answers to this question...
- Q18. What are the key capabilities of Enterprise Threat Detection? Note: There are 2 correct an...
- Q19. Which features does the SAP Router support? Note: There are 2 correct answers to this ques...
- Q20. What are characteristics only valid for the MDC high isolation mode?...
- Q21. Which of the following programs can be used to enable ALE Audit using the ALEAUD message t...
- Q22. Which platform services are available in the Cloud Foundry? Note: There are 2 correct answ...
- Q23. How can you describe static and dynamic assignments? Note: There are 2 correct answers to ...
- Q24. You want to check the custom ABAP codes in your system for security vulnerabilities and yo...
- Q25. How do you check when and by whom profiles were assigned or deleted?...
- Q26. How would you control access to the ABAP RFC function modules? Note: There are 2 correct a...
- Q27. You are consolidating user measurement results and transferring them to SAP. What act on d...
- Q28. How do you handle user "SAP 'in AS ABAP? Note: There are 3 correct answers to this questio...
- Q29. Which authorization object is required to support trusted system access by an RFC user fol...
- Q30. You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Whi...
- Q31. Which tools can you use to troubleshoot an authorization issue with a Fiori application? N...
- Q32. To enable access between tenant databases, what do you need to do in an SAP HANA system fo...
- Q33. Your customer runs a 3-tier environment You are asked to set up controls around monitoring...
- Q34. For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA sys...
- Q35. What is required when you configure the PFCG role for an end-user on the front-end server?...
- Q36. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q37. You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are perfor...
- Q38. What is required when you configure the PFCG role for an end-user on the front-end server?...
- Q39. Where can we store the Security Audit Log events? Note: There are 2 correct answers to thi...
- Q40. You are asked to set up controls to monitor sensitive objects (such as programs, user exit...
- Q41. What authorization object is checked when a user selects an A BAP Web Dynpro application t...
- Q42. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q43. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q44. What are the requirements of SPNego SSO configuration in an SAP Fiori front-end system? No...
- Q45. Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thor...
- Q46. An end user has indicated that they are getting an authorization error when attempting to ...
- Q47. You want to use Configuration Validation functionality in SAP Solution Manager to check th...
- Q48. What are some characteristics of an SAP HANA multitenant database system (MDC) running in ...
- Q49. Which measures should we implement to protect the PSEs? Note: There are 2 correct answers ...
- Q50. Why should you create multiple dispatchers in SAP Identity Management? Note: There are 2 c...
- Q51. In your system, you have a program which calls transaction A. Users with access to this pr...
- Q52. Which OData authorizations are required for a user to see business data in the SAP Fiori L...
- Q53. Which type of systems can be found in the Identity Provisioning Service landscape? Note: T...
- Q54. What does the SAP Security Optimization Service provide? Note: There are 2 correct answers...
- Q55. When re-configuring the user management engine (UME) of an AS Java system, what do you nee...
- Q56. Based on your company guidelines you have set the password expiration to 60 days. Unfortun...
- Q57. You have configured a Gateway SSO authentication using X.509 client certificates. The conf...
- Q58. What are the characteristics of assertion tickets? Note: There are 2 correct answers to th...
- Q59. Which type of systems can be found in the Identify Provisioning Service landscape? Note: T...
- Q60. You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SA...
- Q61. Which transaction or report can be used to audit profile assignments in an SU01 user maste...
- Q62. Which data source needs to be integrated into SAP Identity Management via the Virtual Dire...
- Q63. How are security relevant objects related in the Cloud Foundry?Note: There are 2 correct a...
- Q64. Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fior...
- Q65. How is the role concept applied in the authorizations for Core Data Services (CDS) views?...
- Q66. You want to create a role to provide users the ability to display and change an HR table's...
- Q67. Under which group can you find the "System Recommendations" file in the Solution Manager l...
- Q68. Which authorization object is required to support trusted system access by an RFC user fol...
- Q69. Who can revoke a runtime role from a user in the SAP HANA tenant database? Note: There are...
- Q70. What does return code 1 2 mean when performing STAUTHTRACE?...
- Q71. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q72. The SAP HANA database has its parameters configured with its default values. How can the S...
- Q73. While performing an audit of changes to the system and client change options for your prod...
- Q74. What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note:...
- Q75. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q76. Which of the following user types can be used to log on interactively? Note: There are 2 c...
- Q77. Where can you store Security Audit Log Events? Note: There are 2 correct answers to this q...
- Q78. What authorization object is checked when a user selects an ABAP Web Dynpro application to...
- Q79. What authorization objects do we need to create job steps with external commands in a back...
- Q80. Which tasks would you perform to allow increased security for the SAP Web Dispatcher WebAd...
- Q81. You want to check the custom ABAP codes in your system for security vulnerabilities and yo...
- Q82. The SSO authentication using X.509 client certificates is configured. Users complain that ...
