Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

what things you have to take care before executing run system trace?

1250

explain the personalization tab within a role?

1383

what reports or programs can be used to regenerate sap_all profile?

1 1811

how you can lock all the users at a time in sap?

1 2139

which table is used to store illegal passwords?

1 2273

Is it possible to change role template? How?

1227

Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?

1 2172

what is user buffer?

1171

Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1250

What authorization are required to create and maintain user master records?

1147

Mwhat is the maximum number of profiles in a role and maximum number of object in a role?

1 2197

what is sap security?

1 2200

What is the parameter in security audit log (sm19) that decides the number of filters?

1 2895

What is a composite role?

1454

Which transaction code is used to display the user buffer?

1194


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2647


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2588


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1057


What are the different types of sap security tables?

1109


Can wildcards be used in authorizations?

1203


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4713


What is the difference between role and a profile?

1302


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2484


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2341


What profile versions?

1187


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2445


What are su53 t-codes used for?

1370


Differentiate between usobx_c and usobt_c

1158


What is sap’s grc?

1183


what is hypercare and go live support?

5340