Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

IBM SAP Security Interview Questions
Questions Answers Views Company eMail

what is sox and in sap security?

2 7068

what is the main differene between roe and profile?

5 10507

what is sox and in sap security?

2 25080

whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.

3 13173

how v Check SOD conflicts through VRAT

2 9940

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3048

How to run the daily background job s for virsa violations ? thabks in advance

3158

what is the difference between se16 and se16n ?

4 53394

Can we set any password limitations/exceptions in SAP? If yes, how?

1 10791

DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

1828

What is the Organization level?

3 9899

two company codes ex 1001,1002 and two users ,one user need to access both company codes and another user need to access only one company code need to access by giving same role (one role ) to both of them.how can give access or restrict company codes in one role?

2 8395

how to assign the selected transaction in role example in the role we have a Two transactions(T1,T2)so we have a users U1,U2. i need to assign the T1 and lock the T2 to U1, and U2 assign the bothT1,T2

1 4143

How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2227

How to Maintenance of User Master Records, Profiles, Authorizations

1 3229

Post New IBM SAP Security Interview Questions


IBM SAP Security Interview Questions


Un-Answered Questions

What happens if number of reducers are 0?

283


What is the difference between database.insert and insert?

186


Can we add duplicate keys in a hashmap? What will happen if we attempt to add duplicate values?

473


how to call a dll as a COM dll?

710


How Secure SAP Hybris Is?

5






What does whoami do?

483


Is tomcat good for production?

431


How do you do shell scripting in linux?

429


Is it possible to read/write files to-and-from PL/SQL?

650


Tell me what will be the output of an application engine to use component variables instead of state record?

509


Does imap sync deleted messages from server?

110


What is message contract in wcf?

477


Suppose you have to collect the first name, middle name and the last name of students from the below table. But, you observe that there few missing values either in the first name, middle name and the last name columns. How will you return the first non-null values?

466


What are the functional requirements that are used in the embedded systems?

503


What is use of UNNEST Function?

78