SAP Security Interview Questions
Questions Answers Views Company eMail

SAP GRC 10.0

1 2576

What is a niche profile in SAP ?

2 3527

How many Tcodes can be assigned to a role ?

1 4052

could anyone tell me how we can copy the mass roles from sap_all profiles???????

1616

i want to know how to list out the mass activities and mass organizational levels...

1 1695

what is hypercare and go live support?

Polaris,

4742

What is difference between user master record and user buffer

IBM,

1 3301

Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request

1 2209

What do you mean by ** Generated password is not downward compatible** ?

Deloitte,

2 4841

What is the use of Personalization tab in SU01?

L&T, Reliance,

5017

Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???

1 2828

what is use of copy data in derived role and when we use this one ???

1339

what is user master record and what it contains?

HCL,

1 2196

In pfcg where we can add customized t-codes. And where we can see customized t-codes

IBM,

1237

1.why we use derived role in sap security?2.what is the technical difference between master and derived role?

KPMG,

1 2278


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How do you check background jobs?

747


What are se09 t-codes used for?

705


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2016


What is sap cryptographic library?

648


How to update risk id in rule set?

677






What happens to change documents when they are transported to the production system?

1186


What is the difference between c (check) and u (unmaintained)?

1103


What is the maximum number of profiles in a role and maximum number of object in a role?

632


What is stad?

742


What are the most used tables in sap?

686


Which t-code can be used to delete old security audit logs?

905


What is audit information system?

722


Can you explain protecting public keys?

603


Explain x-glueb and its use in sap security.

814


You want to remove a developer's and developer keys from a system. How would you do that?

638