Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1883

How many authorizations fit into a profile?

1 2172

What happens to change documents when they are transported to the production system?

1830

What is the difference between the table buffer and the user buffer?

1227

What does user compare do?

1201

What are su01d t-codes used for?

1 2146

Pfcg proposed activities but you need only two. What would you do?

1125

What are su10 t-codes used for?

1 1907

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1189

What is the use of tmssup* rfc destinations?

2610

What are se10 t-codes used for?

1133

Differentiate between derived role and composite role

1170

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1055

What are pfcg t-codes used for?

1 2108

You want to remove a developer's and developer keys from a system. How would you do that?

1100


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is the use of su56?

1142


What are se09 t-codes used for?

1308


Pfcg proposed activities but you need only two. What would you do?

1125


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1464


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1050


Can you explain sap system transactions?

1138


What appears as the last sentence in sap note 587410?

1059


Can you explain snc in sap security?

1169


What are su56 t-codes used for?

1255


Can you explain secure store and forward?

1054


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2189


Can you explain protecting public keys?

1065


what is use of copy data in derived role and when we use this one ???

1804


How to do Role Design, Testing and Implementation

2511


Explain protecting public keys?

1268