Which measures should we implement to protect the PSEs? Note: There are 2 correct answers to this question
How are user group administrators and user groups related in SAP HANA? Note: there are 2 correct answers to this question.
To prevent session fixation and session hijacking attacks, SAP's HTTP security session management is highly recommended. What are the characteristics of HTTP security session management? Note: There are 2 correct answers to this question.
What are characteristics of SAP HANA Deployment Infrastructure (HDI) roles? Note: there are 2 correct answers to this question.
Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thorough documentation of all policies and controls that govern the collection and processing of data?
A user has the authorization to execute SP01. What can this user access with authorization object S_ SPO_ ACT when the 'Value for Authorization Check' field is set to "_USER.
Which users should exist in client 000?
Note: There are 2 correct answers to this question
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?
Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question
Which SAP product supports General Data Privacy Regulation (GDPR) compliance through mitigating control testing and validation
Which features does SAProuter provide?
Note: There are 2 correct answers to this question
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transaction do you have to use to map a back-end system to one of those roles?
What are the characteristics of HTTP security session management? Note: There are 3 correct answers to this question
You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?
Why should you create multiple dispatchers in SAP Identity Management? Note: There are 2 correct answers to this question.
How are security relevant objects related in the Cloud Foundry? Note: There are 2 correct answers to this question