Certbus > SAP > SAP Application Associate > C_GRCAC_10 > C_GRCAC_10 Online Practice Questions and Answers

C_GRCAC_10 Online Practice Questions and Answers

Questions 4

Where can you define a mitigating control? (Choose three)

A. In the mitigating controls workset in Access Control

B. In the rule setup in Access Control

C. In the Access Control risk analysis result screen

D. In the central process hierarchy in Process Control

E. In the activity setup in Risk Management

Browse 80 Q&As
Questions 5

How does SAP deliver updates to the standard rule set for Access Control?

A. As BC sets in a Support Package that must be activated in the target system by the system administrator

B. As attachments in an SAP Note that must be entered manually by the system administrator

C. As XML files in an SAP Note that need to be uploaded by the system administrator

D. As BC sets in a Support Package that are automatically activated when the Support Package is deployed

Browse 80 Q&As
Questions 6

Which of the following role provisioning types does Access Control user provisioning support? (Choose three)

A. Direct

B. Indirect

C. Auto-provisioning at end of request

D. No provisioning

E. Combined

Browse 80 Q&As
Questions 7

How do you manually replicate initiators from a previous version of Access Control so they can be used in BRFplus and a MSMP workflow?

A. Create multiple initiator rules and assign them to a process ID containing different detour pathassignments.

B. Create an initiator rule and assign it to multiple process IDs.

C. Create multiple initiator rules and assign them to a process ID.

D. Create an initiator rule and assign it to a process ID.

Browse 80 Q&As
Questions 8

For what purpose can you use the Role Status attribute in Business Role Management?

A. To organize the authorization structure for your company

B. To indicate that a role is relevant for a specific project

C. To restrict the roles available for user access requests

D. To define how essential a role might be for your company

Browse 80 Q&As
Questions 9

For which of the following scenarios would you activate the end-user logon function?

A. A user has no access to the Access Control system and needs to submit a request for access.

B. A user has been promoted to manager and needs to log on to the Access Control system to approve a pending request.

C. A user has successfully completed validation testing.

D. A user has signed a non-disclosure agreement (NDA).

Browse 80 Q&As
Questions 10

What must you define in order to analyze user access for a critical transaction?

A. A critical mitigation control

B. A critical role

C. A critical profile

D. A critical access rule

Browse 80 Q&As
Questions 11

Which prerequisites must be fulfilled if you want to create a technical role using Business Role Management? (Choose two)

A. The role methodology must be defined.

B. Organizational level mapping must be created.

C. Role attributes such as business process and subprocess must be defined.

D. The workflow approval path and relevant approvers must be defined.

E. Access risk rules must be generated.

Browse 80 Q&As
Questions 12

Which of the following actions in Business Role Management require a connection to a target system? (Choose three)

A. Generation

B. Authorization maintenance (actions and permissions)

C. Risk analysis

D. Approval

E. Testing

Browse 80 Q&As
Questions 13

Which transaction do you use to monitor background jobs in Access Control repository synchronization?

A. Schedule Background Jobs (SM36)

B. Test Background Processing (SBTA)

C. Batch Input Monitoring (SM35)

D. Overview of Job Selection (SM37)

Browse 80 Q&As
Questions 14

What information must you specify first when you copy a user access request?

A. User ID

B. System ID

C. Role

D. Request number

Browse 80 Q&As
Questions 15

Your customer wants to adapt their rule set to include custom programs from their SAP ERP production system. How do you ensure that the custom programs can be maintained properly in the rule set? (Choose three)

A. Maintain all relevant authorization objects and the associated default field values in transaction SU24 in the GRC system.

B. Synchronize SU24 data for use in Access Control Function maintenance using transaction GRAC_AUTH_SYNC.

C. Synchronize SU24 data for use in Access Control Function maintenance using transaction GRAC_REP_OBJ_SYNC.

D. Maintain all relevant authorization objects and the associated default field values in transaction SU24 in the SAP ERP system.

E. Create a custom transaction code for each customer program using transaction SE93 in the SAP ERP system.

Browse 80 Q&As
Questions 16

What is a mandatory prerequisite for creating business roles in Business Role Management?

A. A condition group must be created.

B. A role methodology must exist.

C. A workflow approval must be configured.

D. A role naming convention must be defined.

Browse 80 Q&As
Questions 17

What is the purpose of a mitigating control?

A. To control the access that is allowed to be assigned to a role

B. To determine which users are allowed to access the system

C. To assign a compensating control to a risk

D. To limit the access that is allowed to be assigned to a user

Browse 80 Q&As
Questions 18

Which BRFplus object is used as a container for all other BRFplus objects?

A. Expression

B. Condition Group

C. Application

D. Function

Browse 80 Q&As
Exam Code: C_GRCAC_10
Exam Name: SAP Certified Application Associate - SAP BusinessObjects Access Control 10.0
Last Update: Apr 14, 2024
Questions: 80 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99