SAP Security Interview Questions
Questions Answers Views Company eMail

What are pfud t-codes used for?

701

You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

607

Which tables will you use for making customizing setting for security administration?

714

When would you update a sap table directly? What precautions would you taje?

736

Is it possible to have more than one st of org-level values in one role? Explain your answer.

660

When would you update a sap table directly?

661

Differentiate between usobx_c and usobt_c

631

What are su22 t-codes used for?

699

You want to create and maintain user master record. What authorization would you need?

730

What appears as the last sentence in sap note 587410?

667

List the various user types.

633

What are su53 t-codes used for?

837

Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

680

Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

843

As a SAP security consultant what is the most challenged you faced in previous company?

674


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Explain secure store and forward?

630


What does the account assessment category specify in a purchasing document in SAP Materials Management?

935


List the various user types.

633


What is the difference between authorization object and authorization object class?

654


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

680






How to assign any program to user?

1068


What does the item category specify in a purchasing order in SAP Materials Management?

945


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1023


What authorization are required to create and maintain user master records?

677


What is the difference between usobx_c and usobt_c?

652


How we Educated client personnel in R/3 Security and general Basis knowledge

1806


What does the pfcg_time_dependency clean up?

814


Can you explain secure store and forward?

633


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1798


What are su25 t-codes used for?

707