Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.

2 5716

1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?

IBM,

3 24063

Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur

10 17129

how many composite roles can be assigned to a user ?

ADP, Baidu,

4 15959

What is the difference between ECC security and RAR security when GRC (RAR

ADP, Baidu,

2 11504

What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?

IBM,

4 11587

What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?

Wipro,

3 11821

Whay can't you assign a composite role to another composite role ? Need clear explaintion.

Wipro,

3 19443

What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Wipro,

13 29749

How can you find all t-codes which are locked in the system ?

Wipro,

5 15349

how to lock the client?

IBM,

3 12281

how to delete a single role,the single role is existing with 10 users

4 11974

How to access sap security throw internet?

2 7141

in how many roles a T-code exists? Find it without se16 or suim

IBM,

10 29852

I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?

1 8162


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is the critical issue u are faced in your previous experience

1934


Explain protecting public keys?

1261


Pfcg proposed activities but you need only two. What would you do?

1121


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1965


When would you update a sap table directly?

1078


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1317


Which t-code can be used to delete old security audit logs?

1476


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4700


What are pfud t-codes used for?

1243


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2138


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

2082


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2336


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2334


What is the maximum number of profiles in a role and maximum number of object in a role?

1020


how to do Reporting and Analysis authorizations

2456