What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3 correct answers to this question.
What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?
In SAP S/4HANA Cloud Public Edition, what does the ID of an SAP-predefined Space refer to?
In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2 correct answers to this question.
Which of the following can you use to check if there is an application start lock on an application contained in a PFCG role? Note: There are 2 correct answers to this question.
SAP BTP distinguishes between which of the following users? Note: There are 2 correct answers to this question.
Which tool can you use to modify the entities schema content across multiple repositories?
To connect to data sources that are NOT all based on OData, which of the following options does SAP recommend you use?
What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3 correct answers to this question.
Which solution is NOT used to identify security recommendations for the SAP Security Baseline?
Which of the following services does the Identity Authentication Service provide? Note: There are 2 correct answers to this question.
When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?
When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3 correct answers to this question.
Which of the following allow you to control the assignment of table authorization groups? Note: There are 2 correct answers to this question.
In which order do you define the security-relevant objects in SAP BTP?
Which functions in SAP Access Control can be used to approve or reject a user’s continued access to specific security roles? Note: There are 2 correct answers to this question.
Which cryptographic libraries are provided by SAP? Note: There are 2 correct answers to this question.
Which of the following functions within SAP GRC Access Control support access certification and review? Note: There are 2 correct answers to this question.
Which cybersecurity type does NOT focus on protecting connected devices?
What is the correct configuration setting in table PRGN_CUST for user assignments when transporting roles within a Central User Administration scenario?
What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3 correct answers to this question.
Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you perform a Modification Comparison using SU25. What does this comparison do?
For users with system administration authorization, which additional functions are provided by the SAP Easy Access menu? Note: There are 2 correct answers to this question.
For which of the following can transformation variables be used?