Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What authorization is required to create and maintain user master records?

1107

How to find out who has deleted users in the system?

1182

Can you explain sap system transactions?

1138

How can you get the user list in sap?

1 2398

What is sap’s grc?

1184

What are the most used tables in sap?

1221

Which transaction code is used to manage lack entries?

1 2404

What is the difference between authorization object and authorization object class?

1136

Can you explain internet-level security?

1139

Can you explain network topology in sap systems?

1117

Can you explain transport system-level security?

1245

What is t code?

1127

What is sap internet transaction server?

1185

Can you explain protecting public keys?

1070

What is stad?

1177


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How to find out who has deleted users in the system?

1182


Which tables will you use for making customizing setting for security administration?

1162


what is use of copy data in derived role and when we use this one ???

1811


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1051


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4265


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2191


You want to remove a developer's and developer keys from a system. How would you do that?

1101


what is the process to find that one consultant had removed a table from sap tables

2537


What does the item category specify in a purchasing requisition in SAP Materials Management?

1525


Can you explain document transfer-level security?

1155


What are the different types of sap security tables?

1113


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2491


What authorization is required to create and maintain user master records?

1107


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1254


What is sap cryptographic library?

1076