How can you protect a system when you do not want the user assignments for a role to be transported?
A. Restrict import of users in table PRGN_CUST in the target system
B. Restrict import of users in table PRGN_CUST in the development system
C. Restrict access to the user assignment tab in PFCG in the target system
D. Restrict access to the user assignment tab in PFCG in the development system
The report “Search for Application in Role Menu” can be called via which of the following options? (Choose two.)
A. Transaction RSUSR_ROLE_MENU
B. Transaction SUIM, (Menu node "Change Documents")
C. Transaction RSUSR_START_APPL
D. Transaction SUIM (menu node "Roles")
Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? (Choose two.)
A. /IWFND/MAINT_SERVICE
B. /UI2/GW_MAINT_SRV
C. /IWFND/GW_SYS_ALIAS
D. /IWFND/GW_CLIENT
A PFCG role can be linked to an SAP Organizational Management structure by which object types? (Choose three.)
A. Person
B. Position
C. Job
D. Organizational Unit
E. Task
Which of the following describes an Authorization Object class?
A. It defines a group of 1 to 10 authorization fields together.
B. It defines the smallest unit against which an authorization check can be run.
C. It defines a logical grouping of authorization objects.
D. It defines authorizations for different authorization objects.
Which of the following are prerequisites for using transaction PFCG? (Choose two.)
A. Maintain parameter auth/no_check_in_some_cases = Y
B. Fill in initials values for customer tables using transaction SU25
C. Maintain the Check Indicators for Critical Authorization objects
D. Generate Standard Role SAP_NEW using transaction SU25
Which of the following user types are precluded from logging onto the system directly? (Choose three.)
A. Dialog
B. Service
C. Communication
D. Reference
E. System
Which of the following actions correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
A. The service provider queries the user for authentication credentials.
B. The identity provider queries the user for authentication credentials.
C. The identity provider returns the user to the service providers with an authentication request.
D. The identity provider presents the requested resource to the user.
Which of the following defines "Phishing"?
A. Pretending to be another user
B. Acquiring sensitive information by masquerading as a trustworthy entity
C. Overloading an application with requests
D. Modifying an IP address of the source of the TCP/IP packet
What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? (Choose two.)
A. To recommend Legal Change Notes related to SAP innovations
B. To recommend Performance Notes to improve system response
C. To recommend SAP Hot News Notes (priority 1 and 2)
D. To recommend SAP Security Notes for evaluation