Which tool do you use to customize the SAP HANA default password policy? Note: There are 2 correct answers to this question.
A. SAP HANA Lifecycle Manager
B. SAP HANA Studio
C. SAP HANA Cockpit
D. SAP Web IDE
How would you control access to the ABAP RFC function modules? Note: There are 2 correct answers to this question.
A. O Block RFC Callback Whitelists
B. O Restrict RFC authorizations
C. O Deactivate switchable authorization checks
D. O Implement UCON functionality
What is required when you configure the PFCG role for an end-user on the front-end server? Note: There are 2 correct answers to this question.
A. The catalog assignment for the start authorization
B. The S_RFC authorization object for the OData access
C. The Fiori Launchpad designer assignment
D. The group assignment to display it in the Fiori Launchpad
How can you protect a table containing sensitive data using the authorization object S_TABU_DIS?
A. The tables containing sensitive data must be associated with table groups in table TBRG.
B. The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.
C. Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables
D. The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can then be filled with *.
Why should you create multiple dispatchers in SAP Identity Management? Note: There are 2 correct answers to this question.
A. To accommodate scalability
B. To support fail-over scenarios
C. To handle password provisioning
D. To handle special network access requirements
A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12.
What does the Return Code 12 signify?
A. "Objects not contained in User Buffer"
B. "No authorizations and does NOT have authorization object in their buffer"
C. "No authorizations but does have authorization object in their buffer"
D. "Too many parameters for authorization checks"
Which communication methods does the SAP Fiori Launchpad use to retrieve business data? Note: There are 3 correct answers to this question.
A. HTIP(S)
B. Trusted RFC
C. Secure Network Communication (SNC)
D. Info Access (InA)
E. Data
What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question.
A. The Logon ticket is used for user-to-system communication
B. The Logon ticket is domain restricted
C. The Logon ticket has an unconfigurable lifetime validity
D. The Logon ticket session is held in the working memory
Which features does the SAP Router support? Note: There are 2 correct answers to this question.
A. Balancing the load to ensure an even distribution across the back-end servers
B. Terminating, forwarding and (re)encrypting requests, depending on the SSL configuration
C. Password-protecting connections from unauthorized access from outside the network
D. Controlling and logging network connections to SAP systems
You verified the password of the TMSADM user in your SAP landscape to be SAP defaulted. You want to reset this password by using program TMS_UPDATE_PWD_OF_TMSADM.
What steps would you take to reset this password? Note: There are 2 correct answers to this question
A. Run this program in the Domain Controller (client 000)
B. Lock TMSADM in all the system/clients including 000
C. Assign "SAP_ALL" to TMSADM in all systems/clients including 000
D. Deactivate the SNC opt on