Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

Note! The C_SECAUTH_20 Exam is no longer available.

C_SECAUTH_20 SAP Certified Technology Associate - SAP System Security and Authorizations Questions and Answers

Questions 4

What is the purpose of securing sensitive business data? Note: There are 3 correct answer to this question.

Options:

A.

Reduction of training Cost

B.

Protection of Intellectual property

C.

Correctness of Data

D.

Disruption of software deployment

E.

Protection Image

Buy Now
Questions 5

Which TADIR Service Object type includes business functional authorization objects used within the OData execution?

Options:

A.

IWSG

B.

IWSC

C.

OSOD

D.

IWSV

Buy Now
Questions 6

Which of the following conditions apply when merging authorizations for the same object? Note: There are 2 correct answer to this question.

Options:

A.

Changed authorizations can be merged with manual authorizations, even if the activation status is different

B.

Changed authorizations can be merged with manual authorizations, as long as the activation status is the same

C.

Both activation status and maintenance status of the authorizations match

D.

Both activation status and maintenance status of the authorizations do not match

Buy Now
Questions 7

You are Configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure access?

Options:

A.

It allows you to specify access to tables associated with a specific authorization group

B.

It allows you specify access to specific client-dependent table

C.

It allows you specify access to a specific client independent table

D.

It allows you specify access to tables reference by a specific program group

Buy Now
Questions 8

Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? Note: There are 3 correct answer to this question.

Options:

A.

Data Archiving

B.

Data Destruction

C.

Data Logging

D.

Data retention

E.

Alert Notification

Buy Now
Questions 9

Which of the following are system security threats? Note: There are 3 correct answer to this question.

Options:

A.

Authority Violation

B.

Nonrepudiation

C.

Code Injection

D.

System Penetration

E.

Availability

Buy Now
Questions 10

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this

limitation. Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?

Options:

A.

login/disable_multi_rfc_login

B.

login/disable_multi_gui_lgoin

C.

Login/server_logon_restriction

D.

Login/ multi_login_users

Buy Now
Questions 11

When you are troubleshooting an application start issue, what does the Search Startable Application in Roles report help you determine?

Note: There are 2 correct answer to this question.

Options:

A.

If the PFCG roles contains all the start authorizations required for the application

B.

If the PFCG menu contains SAP Fiori Tile Group

C.

If there is an application start lock

D.

If the PFCG roles assigned to end user

Buy Now
Questions 12

Which of the following describe the behavior of a reference user when assigned to a user master record? Note: There are 2 correct answer to this question.

Options:

A.

The reference user roles are directly assigned to the user master record.

B.

The roles of the reference user are always hidden.

C.

The roles of the reference user can be shown.

D.

The user master record references the role and authorizations assigned to the reference user.

Buy Now
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update: Mar 24, 2024
Questions: 80
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 Apr 2024