Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium SAP C_SEC_2405 Dumps Questions Answers

Page: 1 / 6
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Question 1

What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3 correct answers to this question.

Options:

A.

Role maintenance reads applications from a catalog.

B.

Role maintenance reads applications from role menus.

C.

Manual role authorizations are supported in custom catalogs.

D.

Authorization defaults define role authorizations.

E.

Catalogs are assigned to role menus.

Buy Now
Question 2

What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?

Options:

A.

Field values have not been changed.

B.

The field delivered with content was changed but the old value was retained.

C.

Field values were changed as a result of the merge process.

D.

Field values were unchanged and no new authorization was added.

Question 3

In SAP S/4HANA Cloud Public Edition, what does the ID of an SAP-predefined Space refer to?

Options:

A.

The software release it was created for

B.

The SAP Fiori applications it was defined for

C.

The business area it was designed for

D.

The business roles it is to be assigned to

Question 4

In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2 correct answers to this question.

Options:

A.

Subaccount

B.

Global Account

C.

Directory

D.

Organization

Question 5

Which of the following can you use to check if there is an application start lock on an application contained in a PFCG role? Note: There are 2 correct answers to this question.

Options:

A.

Transaction SUIM - Executable Transactions report

B.

Transaction SM01_CUS

C.

Transaction SUIM - Transactions Executable with Profile report

D.

Transaction SM01_DEV

Question 6

SAP BTP distinguishes between which of the following users? Note: There are 2 correct answers to this question.

Options:

A.

Key users

B.

Technical users

C.

Business users

D.

Platform users

Question 7

Which tool can you use to modify the entities schema content across multiple repositories?

Options:

A.

SAP BTP Account Explorer

B.

SAP Cloud Identity Services Transformation Editor

C.

SAP Cloud Identity Services Schemas app

D.

SAP Business Application Studio

Question 8

To connect to data sources that are NOT all based on OData, which of the following options does SAP recommend you use?

Options:

A.

OData Provisioning service

B.

SAP Process Integration

C.

Cloud connector

D.

SAP Integration Suite

Question 9

What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3 correct answers to this question.

Options:

A.

It is prioritized.

B.

It is categorized.

C.

It is pseudonymized.

D.

It is normalized.

E.

It is enriched.

Question 10

Which solution is NOT used to identify security recommendations for the SAP Security Baseline?

Options:

A.

SAP Security Notes

B.

SAP EarlyWatch Alert

C.

SAP Code Vulnerability Analyzer

D.

SAP Security Optimization Service

Question 11

Which of the following services does the Identity Authentication Service provide? Note: There are 2 correct answers to this question.

Options:

A.

Policy refinement

B.

Authentication

C.

Single Sign-On

D.

Central User Repository

Question 12

When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?

Options:

A.

TADIR IWSV - SAP Gateway Business Suite Enablement-Service

B.

TADIR G4BA - SAP Gateway Odata V4 Backend Service Group & Assignments

C.

TADIR IWSG - SAP Gateway: Service Groups Metadata

D.

TADIR INA1 - InA Service

Question 13

When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3 correct answers to this question.

Options:

A.

One user administrator per application area in the production system

B.

One user administrator per production system

C.

One authorization profile administrator

D.

One authorization data administrator

E.

One decentralized role administrator

Question 14

Which of the following allow you to control the assignment of table authorization groups? Note: There are 2 correct answers to this question.

Options:

A.

V_DDAT_54

B.

PRGN_CUST

C.

SSM_CUST

D.

V_BRG_54

Question 15

In which order do you define the security-relevant objects in SAP BTP?

Options:

Question 16

Which functions in SAP Access Control can be used to approve or reject a user’s continued access to specific security roles? Note: There are 2 correct answers to this question.

Options:

A.

SOD Review

B.

Role Certification

C.

User Access Review

D.

Role Reaffirm

Question 17

Which cryptographic libraries are provided by SAP? Note: There are 2 correct answers to this question.

Options:

A.

CommonCryptoLib

B.

SecLib

C.

Cryptlib

D.

SAPCRYPTOLIB

Question 18

Which of the following functions within SAP GRC Access Control support access certification and review? Note: There are 2 correct answers to this question.

Options:

A.

Role Review

B.

SOD Review

C.

Role Reaffirm

D.

User Reaffirm

Question 19

Which cybersecurity type does NOT focus on protecting connected devices?

Options:

A.

Application security

B.

Cloud security

C.

Network security

D.

IoT security

Question 20

What is the correct configuration setting in table PRGN_CUST for user assignments when transporting roles within a Central User Administration scenario?

Options:

A.

SET_IMP_LOCK_USERS = YES

B.

SET_IMP_LOCK_USERS = NO

C.

USER_REL_IMPORT = YES

D.

USER_REL_IMPORT = NO

Question 21

What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3 correct answers to this question.

Options:

A.

Conceal keys

B.

Store keys

C.

Rotate keys

D.

Transmit keys

E.

Generate keys

Question 22

Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you perform a Modification Comparison using SU25. What does this comparison do?

Options:

A.

It compares your changes to the SAP defaults in USOBX_C and USOBT_C with the new SAP defaults in the current release and allows you to make adjustments.

B.

It compares your changes to the SAP defaults in USOBX and USOBT with the new SAP defaults in the current release and allows you to make adjustments.

C.

It compares the Role Maintenance data from the previous release with the data for the current release and writes any new default values in tables USOBX_C and USOBT_C.

D.

It compares the Role Maintenance data from the current release with the data for the previous release and allows you to adjust any custom default values in tables USOBX and USOBT.

Question 23

For users with system administration authorization, which additional functions are provided by the SAP Easy Access menu? Note: There are 2 correct answers to this question.

Options:

A.

Calling menus for roles and assigning them to users

B.

Calling programs

C.

Creating roles

D.

Creating users

Question 24

For which of the following can transformation variables be used?

Options:

A.

To save data to the output JSON file

B.

To save data temporarily

C.

To save data permanently

Page: 1 / 6
Total 80 questions