Certbus > SAP > SAP Application Associate > C_AUDSEC_731 > C_AUDSEC_731 Online Practice Questions and Answers

C_AUDSEC_731 Online Practice Questions and Answers

Questions 4

Which of the following activities are part of SAP roles design? Note: There are 2 correct answers to this question.

A. Determine the role naming convention

B. Design the SAP transports schedule.

C. Identify SAP and custom transactions and reports.

D. Analyze the data migration requirements.

Browse 80 Q&As
Questions 5

Which of the following sequences of steps can you use to create a user-defined role?

Note: There are 2 correct answers to this question.

A. 1. Enter role name.

2.

Maintain authorization data.

3.

Generate authorization profile.

4.

Save the role.

B. 1. Enter role name.

2.

Generate authorization profile.

3.

Maintain authorization data.

4.

Save the role.

C. 1. Enter role name.

2.

Maintain authorization data.

3.

Save the role.

4.

Generate authorization profile.

D. 1. Enter role name.

2.

Save the role.

3.

Maintain authorization data.

4.

Generate authorization profile.

Browse 80 Q&As
Questions 6

How do you delete an existing role in all three SAP systems: development, test, and production?

A. Configure Central User Administration (CUA) to delete the role across the three systems.

B. Log on to the development system. Delete the role across the three systems with transaction SU10.

C. Delete the role in the development system. Create transports without this role. Release the transport to test and production.

D. Enter the role into a transport. Delete the role in the development system. Release the transport to test and production.

Browse 80 Q&As
Questions 7

You want to post a goods receipt to two plants, 1000 and 1200, using transaction Enter Other Goods Receipts (MB1C). When you post the goods receipt to plant 1200, you receive an authorization error message.

How do you analyze the error?

Note: There are 2 correct answers to this question.

A. Validate the user group in user master (transaction SU01).

B. Run the user information system (transaction SUIM).

C. Perform authorization error analysis (transaction SU53).

D. Run authorization trace (transaction ST01).

Browse 80 Q&As
Questions 8

Which of the following can you display with the user information system? Note: There are 2 correct answers to this question.

A. User role assignments

B. Authorization failures

C. Transactions contained in a role

D. Executed transactions

Browse 80 Q&As
Questions 9

When you logon to the system with the SAP_AUDITOR_SA role, which of the following reports can be found in the Top 10 Security Reports folder of the Audit Information System (AIS)?

Note: There are 2 correct answers to this question.

A. Date Monitoring (S_PH0_48000450)

B. Analysis of Security Audit Log (SM20N)

C. IDoc List (RSEIDOC2)

D. Check Passwords of Standard Users (RSUSR003)

Browse 80 Q&As
Questions 10

Which of the following environments are provided by SAP NetWeaver? Note: There are 2 correct answers to this question.

A. An ABAP runtime environment

B. A client/server environment

C. A three-tier environment

D. A Java runtime environment

Browse 80 Q&As
Questions 11

Which of the following actions allows you to schedule the execution of a report from transaction SA38 at an off-peak time?

A. Select Execute with Variant (Shift+F6).

B. Select Execute and Print (CTRL+P).

C. Select Execute (F8).

D. Select Background (Shift+F9).

Browse 80 Q&As
Questions 12

Which of the following communication paths can be protected by Secure Network Communication (SNC)? Note: There are 2 correct answers to this question.

A. SAProuter to an external Remote Function Call

B. SAP system application server to a database

C. SAP GUI for Windows to an SAP system application server

D. SAP system application server to an external Remote Function Call

Browse 80 Q&As
Questions 13

In an SAP NetWeaver AS ABAP system, which security notes have the highest priority?

Note: There are 2 correct answers to this question.

A. Notes shown by transaction ABAP Note Assistant (SNOTE)

B. Notes shown in Customer

C. Notes marked by the Early Watch Alert in red

D. Notes shown by RSECNOTE

Browse 80 Q&As
Questions 14

Which of the following must be available before you can perform Security Optimization Service checks for SAP vulnerability risks?

A. SAP Solution Manager

B. SAP ERP Central Component

C. SAP NetWeaver Business Warehouse

D. SAP NetWeaver Portal

Browse 80 Q&As
Questions 15

Which transaction can you use to create background jobs?

A. SU10

B. PFCG

C. SM36

D. SA38

Browse 80 Q&As
Questions 16

What data can you edit on the Logon Data tab of the User Maintenance tranasction (SU01)? Note: There are 2 correct answers to this question.

A. User logon language

B. User parameters

C. User group for authorization checks

D. User type

Browse 80 Q&As
Questions 17

You have to generate a segregation-of-duties violation report for the following purchasing transactions: ME51N, ME21N, MIGO, and MIRO.

Which of the following reports lists users that are assigned to all of these transactions?

A. User with Critical Authorization (S_BCE_68002111)

B. Roles by User Assignment (S_BCE_680001419)

C. Change Documents for Users (S_BCE_68002311)

D. Executable Transactions Report (S_BCE_68001429)

Browse 80 Q&As
Questions 18

Which of the following are reasons to use SAP Business Workflow? Note: There are 2 correct answers to this question.

A. To automate the control and processing of cross-application processes

B. To change existing functions of an SAP system

C. To record the progress of the execution of an application

D. To respond to errors and exceptions in existing business processes

Browse 80 Q&As
Exam Code: C_AUDSEC_731
Exam Name: SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31
Last Update: Apr 18, 2024
Questions: 80 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99