Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 6485

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 9813

how to secure the customizing Tcodes in sap

1 7573

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 5997

1 .what are the authorization switches in security

IBM,

1 7540

use of T-code SE63

IBM, Satyam,

2 11984

why fire fighter id is using in the production system ?

IBM,

3 11685

how to modify a mass users validity,address,email...at a time ?

IBM,

3 18146

why we are using the landscape in sap r/3 ?

HP,

4 11459

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 20172

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 3740

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 15724

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 8717

What are the Critical Tcodes and Authorization Objects in R/3.

3 20372

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

2253


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How we Educated client personnel in R/3 Security and general Basis knowledge

2229


Is it possible to change role template? How?

1155


What is stad?

1118


How to find out who has deleted users in the system?

1110


How to update risk id in rule set?

1096


What is audit information system?

1094


Can you explain document transfer-level security?

1084


How to run the daily background job s for virsa violations ? thabks in advance

3619


By which parameter number of entries are controlled in the user buffer?

1350


What appears as the last sentence in sap note 587410?

1018


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1095


What does the item category specify in a purchasing requisition in SAP Materials Management?

1477


What does user compare do?

1168


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2253


how we do CUA configuration in Quality system

2374