New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium SAP C_SECAUTH_20 Dumps Questions Answers

SAP Certified Technology Associate - SAP System Security and Authorizations Questions and Answers

Question 1

Which of the following conditions apply when merging authorizations for the same object? Note: There are 2 correct answer to this question.

Options:

A.

Changed authorizations can be merged with manual authorizations, even if the activation status is different

B.

Changed authorizations can be merged with manual authorizations, as long as the activation status is the same

C.

Both activation status and maintenance status of the authorizations match

D.

Both activation status and maintenance status of the authorizations do not match

Buy Now
Question 2

Which of the following Correctly describe the SAP Security Optimization Service (SOS) Offering? There are 3 correct answer to this question.

Options:

A.

Onsite Service: Performed by Specialist

B.

Remote Service : Part of CQC service offering

C.

Self Service : All Completely Automated checks in all SAP system

D.

Onsite Service: Available with additional Cost

E.

Self Service: Perform by experienced service engineers

Question 3

Which archiving object can you use for archiving change documents related to changes with authorizations assigned to user?

Options:

A.

US_PROF

B.

US_AUTH

C.

US_PASS

D.

USJJSER

Question 4

Which of the following describes an Authorization Object Class?

Options:

A.

It defines a logical grouping of authorization objects

B.

It defines authorizations for different authorization objects

C.

It defines a group of 1 to 10 authorization field together

D.

It defines smallest unit against which an authorization check can be run

Question 5

Which of the following are SAP UI5 Fiori application types? Note: There are 2 correct answer to this question.

Options:

A.

Legacy

B.

Transactional

C.

Analytical

D.

Web Dynpro

Question 6

What information can be provided by an Audit Class? Note: There are 3 correct answer to this question.

Options:

A.

Dialog Logon

B.

RFC/CPIC Logon

C.

Transaction Start

D.

User Roles

E.

User Authorizations

Question 7

Which of the following objects allows you to restrict which users can distribute a role to another system using an RFC destination?

Options:

A.

S_USER_AGR

B.

S_USER_SYS

C.

S_USER_AUT

D.

S_USER_STA

Question 8

Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?

Options:

A.

Configuration

B.

Logging

C.

Activation

D.

Evaluation

Question 9

In SAP S/4Hana Cloud authorization objects are grouped in to which item?

Options:

A.

Groups

B.

Privileges

C.

Single technical roles.

D.

Business Roles

Question 10

What are the main features of SAP Enterprise Threat Detection (ETD)? Note: There are 3 correct answer to this question.

Options:

A.

Forensic investigations

B.

Monitoring of GDPR Compliance

C.

Segregation of Duty Analysis

D.

Monitoring of security events

E.

Realtime Alerts

Question 11

Which of the transaction allows a user to change the authorization values of multiple roles at same time?

Options:

A.

PFCGROLEDIST

B.

SUPC

C.

PFCGMASSVAL

D.

PFCG

Question 12

In the case of missing OData authorizations, why is it not recommended to maintained S_SERVICE manually within an SAP Fiori Authorization Role?

Note: There are 2 correct answer to this question.

Options:

A.

The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an OData service

B.

The SRV_NAME Value of the S_SERVICE authorization object is the name of an OData service

C.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values

D.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with same authorization values