SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.

3 5434

How see hierarchies in BI security

IBM, L&T,

1 6270

What are the critical tables in BI Security

IBM, L&T,

1 13231

How to trace the Users in BI Security and give me navigation

IBM, L&T,

2 9206

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

IBM,

2251

What r the daily activity in BI security

IBM, iGate,

1 7759

What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user

IBM,

2 14625

What is purpose of using Pound Sign(#) and colon(;) in BI/BW security

IBM,

3 14418

Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that

IBM,

3 9105

Whr will u find u Generation logs in BI security and What are Generation logs will come

IBM,

2 8417

What are the T-codes in BI security

HP, IBM,

3 19475

Join SAP Security Group on Facebook for active discussions.

1 4752

Difference between User Group in "Logon data" and "Groups" tab in SU01

HP,

8 29290

What is the difference between Execution and Simulation in grc rar

IBM,

1 12908

Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?

Cognizant,

4 12857


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Can you explain secure store and forward?

840


What are the different types of sap security tables?

893


How do you check background jobs?

966


what is your ticketing tool? can we give some details about how we are getting tickets

1397


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1998


what is use of copy data in derived role and when we use this one ???

1575


What is sap cryptographic library?

863


What are se10 t-codes used for?

931


When would you update a sap table directly? What precautions would you taje?

1020


Explain x-glueb and its use in sap security.

1097


How to update risk id in rule set?

933


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1042


Explain internet-level security?

912


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

886


What is the main purpose of parameters, groups & personalization tabs?

912