SAP Security Interview Questions
Questions Answers Views Company eMail

What authorization is required to create and maintain user master records?

683

How to find out who has deleted users in the system?

705

Can you explain sap system transactions?

695

How can you get the user list in sap?

1 1634

What is sap’s grc?

733

What are the most used tables in sap?

686

Which transaction code is used to manage lack entries?

1 1593

What is the difference between authorization object and authorization object class?

654

Can you explain internet-level security?

658

Can you explain network topology in sap systems?

635

Can you explain transport system-level security?

610

What is t code?

696

What is sap internet transaction server?

708

Can you explain protecting public keys?

603

What is stad?

739


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

1630


Can you explain network topology in sap systems?

635


What are the different types of sap security tables?

673


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

635


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2284






You want to remove a developer's and developer keys from a system. How would you do that?

638


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2021


what is user base in sap security?

1152


What is the main purpose of parameters, groups & personalization tabs?

652


what is user buffer?

739


Can you explain snc in sap security?

654


How to update risk id in rule set?

676


What does the item category specify in a purchasing order in SAP Materials Management?

945


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3756


How to do Role Design, Testing and Implementation

2045