Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

IBM SAP Security Interview Questions
Questions Answers Views Company eMail

Difference between Change Mode and Expert Mode in PFCG?

1 34355

Difference between S_tcode and Menu tab transactions?

5 18140

Red, Yellow, Green in PFCG significance? Can we generate red Roles in PFCG and assign it to Users?

3 16524

Difference between short and Long Description in PFCG?

2 9593

Which request is this Which we create for transportation?

2 5997

1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import

2 21408

1 .what are the authorization switches in security

1 6756

use of T-code SE63

2 10952

why fire fighter id is using in the production system ?

3 10279

how to modify a mass users validity,address,email...at a time ?

3 16375

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1792

what is the difference between PFCG,PFCG_TIME_DEPENDENCY&PFUD???

3 24218

How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?

2 12251

Hi, Can any one tell me the authorization objects for SOD

1 3811

How see hierarchies in BI security

1 5760

Post New IBM SAP Security Interview Questions


IBM SAP Security Interview Questions


Un-Answered Questions

What is the importance of a recovery model?

605


What is SIDBI & what are its function?

647


Give a brief explanation of the fundamental accounting concept of prudence

1719


What is copying field?

83


Can apache run on windows?

483






I am a mba fresher and i got a job in wipro for the post of talent acquisition. And the salary is only Rs.6000 Do you think its chance for me to grow..

3433


What is lazy instantiation in java?

424


How to select an exact color to match?

23


What is actionlistener in java swing?

535


How many turnover company active TAN no applicable and how many deduction % of service.

1356


In block work seawalls what is the purpose of slip joints?

752


Is php easier than node?

519


How do I calculate the difference between two dates in excel?

299


What are the main costumes used by the Japanese women? Explain.

5


Define kernel svm?

42