Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

Explain internet-level security?

1148

Explain snc in sap security?

1195

Explain secure store and forward?

1195

Explain protecting public keys?

1274

Explain composite role?

1 2760

Explain transport system-level security?

1171

Explain network topology in sap systems?

1092

How to know the total no. of users in particular plant in sap?

1 2117

How to approach as a security consultant when a custom t code is created?

1 1900

What are the uses of an authorization group?

1203

In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1072

the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2369


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is your ticketing tool? can we give some details about how we are getting tickets

1602


What is the difference between the table buffer and the user buffer?

1233


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1204


Can you explain secure store and forward?

1057


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2369


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2158


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2491


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1050


What are su53 t-codes used for?

1372


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2590


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4265


You want to remove a developer's and developer keys from a system. How would you do that?

1101


How we Educated client personnel in R/3 Security and general Basis knowledge

2278


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2330


What does the profile generator do?

1133