Certbus > SAP > SAP Certified Technology Associate > C_SECAUTH_20 > C_SECAUTH_20 Online Practice Questions and Answers

C_SECAUTH_20 Online Practice Questions and Answers

Questions 4

The report “Search for Application in Role Menu” can be called via which of the following options? (Choose two.)

A. Transaction RSUSR_ROLE_MENU

B. Transaction SUIM, (Menu node "Change Documents")

C. Transaction RSUSR_START_APPL

D. Transaction SUIM (menu node "Roles")

Browse 80 Q&As
Questions 5

Which of the following describe the behavior of a reference user when assigned to a user master record? (Choose two.)

A. The reference user roles are directly assigned to the user master record.

B. The roles of the reference user are always hidden.

C. The roles of the reference user can be shown.

D. The user master record references the roles and authorizations assigned to the reference user.

Browse 80 Q&As
Questions 6

Which of the following are SAPUI5 Fiori application types? (Choose two.)

A. Analytical

B. Web Dynpro

C. Transactional

D. Legacy

Browse 80 Q&As
Questions 7

When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provided? (Choose three.)

A. UI access to the Apps

B. SAP Favorites

C. Start Authorizations for OData services

D. Catalog for the Start Authorization

E. WAPA Business Server Pages

Browse 80 Q&As
Questions 8

Which is the frequency of SAP Patch day?

A. Yearly

B. Quarterly

C. Weekly

D. Monthly

Browse 80 Q&As
Questions 9

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?

A. SAP Data Services

B. SAP Information Steward

C. SAP Information Lifecycle Management

D. SAP Process Control

Browse 80 Q&As
Questions 10

What is the main purpose of SAP Access Control, as an enterprise software solution?

A. Identify security risk and document compliance

B. Deployment of encryption services

C. Secure authentication for cloud and on-premise

D. Manage corporate social media presence

Browse 80 Q&As
Questions 11

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins?

A. login/server_logon_restriction

B. login/multi_login_users

C. login/disable_multi_gui_login

D. login/disable_multi_rfc_login

Browse 80 Q&As
Questions 12

Which ABAP transaction codes are relevant for SNC Parameter Configuration? (Choose two.)

A. SNC0

B. SNCWIZARD

C. SNCCONFIG

D. STRUST

Browse 80 Q&As
Questions 13

Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?

A. The service provider redirects the user to an identity provider and includes a SAML artifact referring to the authentication request.

B. The service provider gets the authentication request from the identity provider over a SOAP channel.

C. The service provider queries the user for authentication credentials.

D. The identity provider gets the authentication response from the service provider over a SOAP channel.

Browse 80 Q&As
Questions 14

What is the equivalent of the AS ABAP user type System in the AS Java UME security policy?

A. Default user

B. J2EE user

C. Technical user

D. Internal service user

Browse 80 Q&As
Questions 15

When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)

A. If the PFCG role menu contains SAP Fiori Tile Groups

B. If the PFCG roles contain all of the start authorizations required for the application

C. If there is an application start lock

D. If the PFCG roles are assigned to end users

Browse 80 Q&As
Questions 16

SAP Cloud Identity and Access Governance consists of which of the following software services? (Choose three.)

A. Access Request

B. User Access Certification

C. Emergency Access Management

D. Access Analysis

E. Role Design

Browse 80 Q&As
Questions 17

You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?

A. Data Steward

B. Data Processor

C. Data Subject

D. Data Controller

Browse 80 Q&As
Questions 18

Which feature is available in the CommonCryptoLib scenario provided by SAP Security Library?

A. SSL/TLS

B. SPNEGO / ABAP

C. Secure Store and Forward (SSF)

D. Hardware Security Module (HSM)

Browse 80 Q&As
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update: Apr 22, 2024
Questions: 80 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99