SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.

2 4778

1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?

IBM,

3 21763

Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur

10 14430

how many composite roles can be assigned to a user ?

ADP, Baidu,

4 14338

What is the difference between ECC security and RAR security when GRC (RAR

ADP, Baidu,

2 10408

What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?

IBM,

4 10133

What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?

Wipro,

3 10407

Whay can't you assign a composite role to another composite role ? Need clear explaintion.

Wipro,

3 17742

What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Wipro,

13 25293

How can you find all t-codes which are locked in the system ?

Wipro,

5 13370

how to lock the client?

IBM,

3 10843

how to delete a single role,the single role is existing with 10 users

4 10180

How to access sap security throw internet?

2 6205

in how many roles a T-code exists? Find it without se16 or suim

IBM,

10 26761

I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?

1 7320


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

By which parameter number of entries are controlled in the user buffer?

913


What is sap cryptographic library?

645


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

994


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2138


Differentiate between derived role and composite role

663






As a SAP security consultant what is the most challenged you faced in previous company?

674


Can you explain network topology in sap systems?

632


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1800


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

6377


What does the account assessment category specify in a purchasing document in SAP Materials Management?

935


When would you update a sap table directly? What precautions would you taje?

736


what is hypercare and go live support?

4739


What is a composite role?

819


what is sod in sap security?

738


Which t-code can be used to delete old security audit logs?

902