SAP Security Interview Questions
Questions Answers Views Company eMail

Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?

HP,

2 8645

Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )

HP,

3 8134

Q1) What is an Authorization Group and when is it used? Explain with example???

HP,

1 11728

How to assign single tcode to 100 roles with single take

2 14906

What is the difference between Parent role and Composite role

1 12503

how to transport roles

3 8011

how a t code works

HP, IBN,

2238

Can we set any password limitations/exceptions in SAP? If yes, how?

IBM,

1 11337

What's the basic difference in between SU22 & SU24?

3 23716

hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?

2 6851

hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time

2 8409

DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

Accenture, HCL, IBM,

2105

Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE

Accenture,

1 5679

What is the Organization level?

IBM,

3 10674

what is the difference in grc background jobs

2215


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2616


Which t-code can be used to delete old security audit logs?

1225


How to assign any program to user?

1317


How we Educated client personnel in R/3 Security and general Basis knowledge

2054


How to codify for an Item in SAP? How many digits are required for an item?

2454


What are se10 t-codes used for?

926


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4470


What are the different types of sap security tables?

890


Tell me about derived role?

834


What is the use of tmssup* rfc destinations?

2236


Differentiate between derived role and composite role

896


Differentiate between temp role and copy role

972


When would you update a sap table directly? What precautions would you taje?

1016


What does the pfcg_time_dependency clean up?

1042


What is sap cryptographic library?

859