SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.

3 5365

How see hierarchies in BI security

IBM, L&T,

1 6191

What are the critical tables in BI Security

IBM, L&T,

1 13156

How to trace the Users in BI Security and give me navigation

IBM, L&T,

2 9130

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

IBM,

2209

What r the daily activity in BI security

IBM, iGate,

1 7651

What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user

IBM,

2 14553

What is purpose of using Pound Sign(#) and colon(;) in BI/BW security

IBM,

3 14327

Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that

IBM,

3 9009

Whr will u find u Generation logs in BI security and What are Generation logs will come

IBM,

2 8306

What are the T-codes in BI security

HP, IBM,

3 19324

Join SAP Security Group on Facebook for active discussions.

1 4684

Difference between User Group in "Logon data" and "Groups" tab in SU01

HP,

8 29047

What is the difference between Execution and Simulation in grc rar

IBM,

1 12837

Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?

Cognizant,

4 12736


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Can wildcards be used in authorizations?

932


how you can delete multiple roles from qa, dev and production system?

1045


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

1852


what is authorization object and authorization object class?

983


What are the upgrades happened in GRC 5.3 from GRC 5.2?

3957


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1223


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

1821


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

871


What is Sap security t-codes?

921


What are the uses of an authorization group?

926


Can you explain secure store and forward?

801


what is the use of defaults tab in start menu

1600


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2209


What are the most used tables in sap?

925


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1908