SAP Security Interview Questions
Questions Answers Views Company eMail

How to find ECC system, GRC system and BI system ?

1002

What is the main difference between single role and a derived role?

1 1819

How to update risk id in rule set?

890

What is use of derived roles?

971

Tell me about derived role?

805

Does s_tabu_dis org level values in a master role gets reflected in the child role?

1 2002

What is the procedure for role modifications?

890

How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

933

How do we test security systems.

834

What is the use of su56?

900

What is the main purpose of parameters, groups & personalization tabs?

873

What is the maximum number of authorization in an object?

1 1490

What is the maximum number of profiles in a role?

1 1554

What is the maximum number of authorization objects in a role?

1 2389

How to lock all the users at a time?

1 1489


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How we schedule and administering background jobs?

845


What is sap’s grc?

939


what is centralize FFID?

1826


What appears as the last sentence in sap note 587410?

845


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1136


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1908


By which parameter number of entries are controlled in the user buffer?

1152


When would you update a sap table directly?

847


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1053


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4009


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2341


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2081


What are the uses of an authorization group?

929


how we can see FFID if firefighter not able to see FFids ?

1736


User is not there in User master record. Then how to trace the user?

1231