Which of the following activities are part of SAP roles design? Note: There are 2 correct answers to this question.
A. Determine the role naming convention
B. Design the SAP transports schedule.
C. Identify SAP and custom transactions and reports.
D. Analyze the data migration requirements.
Which actions do you execute when you validate an authorization concept? Note: There are 3 correct answers to this question.
A. Test the user roles and authorizations.
B. Test the business processes and authorizations.
C. Assign business processes to roles.
D. Generate an overview of the transaction assignments for each role and user.
E. Run test scenarios for all business processes.
Which transaction can you use to perform role maintenance?
A. PFCG
B. PFUD
C. SUIM
D. SUPC
How do you delete an existing role in all three SAP systems: development, test, and production?
A. Configure Central User Administration (CUA) to delete the role across the three systems.
B. Log on to the development system. Delete the role across the three systems with transaction SU10.
C. Delete the role in the development system. Create transports without this role. Release the transport to test and production.
D. Enter the role into a transport. Delete the role in the development system. Release the transport to test and production.
Which of the following environments are provided by SAP NetWeaver? Note: There are 2 correct answers to this question.
A. An ABAP runtime environment
B. A client/server environment
C. A three-tier environment
D. A Java runtime environment
Which of the following must be available before you can perform Security Optimization Service checks for SAP vulnerability risks?
A. SAP Solution Manager
B. SAP ERP Central Component
C. SAP NetWeaver Business Warehouse
D. SAP NetWeaver Portal
Which of the following can the security audit log record? Note: There are 3 correct answers to this question.
A. Remote Function Calls (RFCs) to function modules
B. User license type usages
C. System performance statistics
D. Changes to user master records
E. Successful and unsuccessful transaction starts
Which of the following is a function of user type System?
A. It allows multiple logons.
B. It checks whether the password has expired.
C. It checks whether the password is initial.
D. It allows dialog logon.
You run change document RSUSR100 (user and authorization log). Which of the following are selection criteria for changed header data? Note: There are 3 correct answers to this question.
A. Language
B. Administrator Lock Set
C. Cost Center
D. Accounting Number
E. User Group
Which of the following are reasons to use SAP Business Workflow? Note: There are 2 correct answers to this question.
A. To automate the control and processing of cross-application processes
B. To change existing functions of an SAP system
C. To record the progress of the execution of an application
D. To respond to errors and exceptions in existing business processes