Join the discussion
Question 1/77
What is the User Management Engine (UME) property "connect on pooling" used for? Note: There are 2 correct answers to this question.
Correct Answer: A,D
Add Comments
- Other Question (77q)
- Q1. What is the User Management Engine (UME) property "connect on pooling" used for? Note: The...
- Q2. What is the default authentication mechanism in the SAP Cloud Platform?...
- Q3. While performing an audit of changes to the system and client change options for your prod...
- Q4. How can you describe the hierarchical relationships between technical entities in the Clou...
- Q5. What are characteristics of SAP HANA Deployment Infrastructure (HDI) roles? Note: there ar...
- Q6. You have delimited a single role which is part of a composite role, and a user comparison ...
- Q7. SAP GRC Access Control provides risk analysis for which of the following? Note: There are ...
- Q8. The SAP HANA database has its parameters configured with its default values. How can the S...
- Q9. Which users should exist in client 000? Note: There are 2 correct answers to this question...
- Q10. A security consultant has activated a trace via ST01 and is analyzing the authorization er...
- Q11. What authorization object is checked when a user selects an ABAP Web Dynpro application to...
- Q12. While performing an audit of changes to the system and client change options for your prod...
- Q13. Which characteristics apply to the SAP ID Service? Note: There are 2 correct answers to th...
- Q14. When re-configuring the user management engine (UME) of an AS Java system, what do you nee...
- Q15. What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note:...
- Q16. How can you protect a table containing sensitive data using the authorization object S_TAB...
- Q17. Which measures should we implement to protect the PSEs? Note: There are 2 correct answers ...
- Q18. What are some characteristics of an SAP HANA multitenant database system (MDC) running in ...
- Q19. How do you secure the special user "SAP*" in AS ABAP? Note: There are 3 correct answers to...
- Q20. You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SA...
- Q21. What must be included in a PFCG role for an end user on the Fiori front-end server to run ...
- Q22. What information constitutes an indirect connection to an individual, in the context of GD...
- Q23. How are security relevant objects related in the Cloud Foundry?Note: There are 2 correct a...
- Q24. What does return code 1 2 mean when performing STAUTHTRACE?...
- Q25. How can you describe static and dynamic assignments? Note: There are 2 correct answers to ...
- Q26. Why do you use table logging in AS ABAP?
- Q27. You want to use Configuration Validation functionality in SAP Solution Manager to check th...
- Q28. You are running an SAP HANA database in a multi database container (MDC) mode with a singl...
- Q29. Which features do SAP HANA SQL-based analytic privileges offer compared to classic XML-bas...
- Q30. Which authorizations should you restrict when you create a developer role in an AS ABAP pr...
- Q31. Under which group can you find the 'System Recommendations' tile in the Solution Manager l...
- Q32. What are the characteristics of HTTP security session management? Note: There are 3 correc...
- Q33. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q34. What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note:...
- Q35. Based on your company guidelines you have set the password expiration to 60 days. Unfortun...
- Q36. You want to allow your trainee colleagues to use the SAP GUI to connect directly to your S...
- Q37. For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA sys...
- Q38. What are the features of the Audit Information System (AIS)? Note: There are 2 correct ans...
- Q39. How can you protect a table containing sensitive data using the authorization object S_TAB...
- Q40. What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note:...
- Q41. You are asked to set up controls to monitor sensitive objects (such as programs, user exit...
- Q42. Which features does SAProuter provide? Note: There are 2 correct answers to this question...
- Q43. How are user group administrators and user groups related in SAP HANA? Note: There are 2 c...
- Q44. You want to configure SNC with X.509 certificates using Common CryptoLib as the cryptograp...
- Q45. Which OData authorizations are required for a user to see business data in the SAP Fiori L...
- Q46. What authorization objects do we need to create job steps with external commands in a back...
- Q47. How would you control access to the ABAP RFC function modules? Note: There are 2 correct a...
- Q48. Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web A...
- Q49. A user has the authorization to execute SP01. What can this user access with authorization...
- Q50. How can you describe the hierarchical relationships between technical entities in the Clou...
- Q51. Which tools can you use to troubleshoot an authorization issue with a Fiori application? N...
- Q52. SAP GRC Access Control provides risk analysis for which of the following? Note: There are ...
- Q53. What does the SAP Security Optimization Service provide? Note: There are 2 correct answers...
- Q54. How are user group administrators and user groups related in SAP HANA? Note: there are 2 c...
- Q55. How is the role concept applied for modeled authorizations based on Core Data Services (CD...
- Q56. Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Pr...
- Q57. For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA sys...
- Q58. Where can we store the Security Audit Log events? Note: There are 2 correct answers to thi...
- Q59. What is the SAP Best Practice to delete a security SAP role from the landscape running SAP...
- Q60. To enable access between tenant databases, what do you need to do in an SAP HANA system fo...
- Q61. To prevent session fixation and session hijacking attacks, SAP's HTTP security session man...
- Q62. Which tools can you use to troubleshoot an authorization issue with a Fiori application? N...
- Q63. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q64. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q65. Who can revoke a runtime role from a user in the SAP HANA tenant database? Note: There are...
- Q66. You have Reason Codes already defined. Which is the correct sequence of steps to configure...
- Q67. You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Whi...
- Q68. To enable access between tenant databases, what do you need to do in an SAP HANA system fo...
- Q69. In your system, you have a program which calls transaction A. Users with access to this pr...
- Q70. To which services packages does SAP Security Optimization Services (SOS) belong?...
- Q71. Which of the following functions can be used to troubleshoot authorization errors for ABAP...
- Q72. Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web A...
- Q73. Which transaction or report can be used to audit profile assignments in an SU01 user maste...
- Q74. Which authorization object is required to support trusted system access by an RFC user fol...
- Q75. How are security relevant objects related in the Cloud Foundry? Note: There are 2 correct ...
- Q76. Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 ...
- Q77. What connection type is used for restricted users?...
