Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations.

IBM,

1 13242

How we Assigning roles to users positions in HR, troubleshoot access issues

IBM,

2 8499

How we Assigning roles to users positions in HR, troubleshoot access issues

IBM,

2 6124

How we Creat Mass users via writing LSMW scripts.

IBM,

6723

what is the landscape of GRC

GE,

3 14144

how do we test security systems.what is the use of SU56

GE, IBM,

2 9498

One of the user logged into Production System, changed a table and then logged out. How will you track him?

Atos Origin, Infosys,

2 14363

How can find out wheather CUA(Central User Administration) is configured on your sap system?

SAIC,

3 11232

How can you lock all the users at a time?

SAIC,

6 15702

what is use of derived roles and where it is used?

IBM,

3 15665

what is use of su56?

Accenture, IBM,

3 13840

what is the rule set in GRC?

Bosch, IBM,

5 30360

How to assign sap_all to end user if i have approval?remember i do not have GRC.

Satyam,

2 12786

what is the use of CUA?

IBM,

2 9062

what is the difference between user buffer and user contex?

3 8715


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

When would you update a sap table directly? What precautions would you taje?

1157


What does the pfcg_time_dependency clean up?

1204


How we Educated client personnel in R/3 Security and general Basis knowledge

2216


what is the process to find that one consultant had removed a table from sap tables

2490


Support types of WOs you have faced?

2246


Why is it important to delete sap-new profile? What steps will you take to do this?

1084


What is Sap security t-codes?

1150


What are the uses of an authorization group?

1132


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1267


what is the main difference between the derived role and a single role?

1089


What are some ap security t codes?

1112


You want to remove a developer's and developer keys from a system. How would you do that?

1046


By which parameter number of entries are controlled in the user buffer?

1343


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2094


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1025