You want to configure SAP Access Control to generate alerts to help manage compliance. What are the available alert capabilities that can be configured? Note; There are 3 correct answers to this question.
A. Identify a user who has executed a critical action and generate an email notification
B. Identify a user who has executed conflicting functions and open a support desk message
C. Identify a user who has executed conflicting functions
D. Identify a control monitor who has failed to execute defined reports in a timely fashion
E. Identify a user who has executed a critical action and open a support desk message.
SAP Access Control delivers multiple applications that can be mapped to BRFplus functions. Which of the following applications can be mapped to a BRFplus function?
Note: There are 3 correct answers to this question.
A. Notification Variables
B. Service Level Agreements
C. Request Multiple Rule Set
D. Initiators
E. HR Triggers
Which of the following are prerequisites for implementing Emergency Access Management? Note: There are 2 correct answers to this question.
A. Users and roles that are used for firefighting activities have been created for the SAP Access Control V D system
B. The repository object sync must be completed.
C. Implementation of a user exit on the SAP Access Control system to prevent direct logon with the Firefighter ID
D. Users and roles that are used for firefighting activities have been created in the target system
Which of the following Business Configuration (BC) sets configure a connector group in SAP Access Control? Note: There are 3 correct answers to this question
A. GRAC_ACCESS_REQUEST_APPL_MAPPING
B. GRAC_RA_RULESET_BASIS
C. GRAC_RA_RULESET_COMMON
D. GRAC_ROLE_MGMT_LANDSCAPE
E. GRAC_RA_RULESET_PSOFT
You are implementing Access Request Management.
Which integration scenarios should you assign to the target connector?
A. PROV, ROLMG
B. PROV
C. PROV, AUTH
D. PROV, ROLMG, SUPMG, AUTH
What can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.
A. To assign it to the standard access request
B. To assign it to an access request template
C. To restrict a user's ability to approve their own requests
D. To determine fields shown in a workflow item
E. To determine roles that can be assigned on a request
Which component plug-in contains SAP Access Control functions for non-HR SAP systems?
A. UIGRAC01
B. GRCPIERP
C. GRCPINW
D. GRCFND_A
Where can you use a custom field in SAP Access Control? Note: There are 2 correct answers to this question.
A. On a risk definition
B. On an access request
C. On a role definition
D. On a mitigating control definition
Business Role Management provides the functionality to improve the role management process. Which of the following capabilities does it offer? Note: There are 2 correct answers to this question.
A. Replacement of the PFCG role management transaction
B. Management of role definition transports
C. Enforcement of consistency in naming conventions
D. Identification of duplicate roles
Which of the following activities can you do in Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.
A. Log on to the Firefighter ID directly with a password
B. Maintain EAM master data in the back-end system
C. Display a log file of performed activities
D. Perform tasks outside of the normal responsibilities