SAP Security Interview Questions
Questions Answers Views Company eMail

SU24 must be set up before implementing any roles. A. True B. False

Cap Gemini,

2 9110

What is the differences between AGR_1251 and AGR_1252?

Cap Gemini,

4 58701

SU24 must be set up before implementing any roles. A. True B. False

Cap Gemini,

3 10974

In which table you can see authorization group for table and which table to see authorization group for program?

Cap Gemini,

8 36117

Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE

Cap Gemini, SAP Labs,

6 18891

for eaxmple we are creating Z-Tcode How to restrict and what level are restict.

Hexaware,

1 9158

hOW many users limit in su10

Accenture, Cap Gemini, Hexaware,

3 25807

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

ABC,

4002

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

ABC,

3451

How to run the daily background job s for virsa violations ? thabks in advance

IBM,

3417

what is the difference between se16 and se16n ?

IBM,

4 54929

Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??

HP, Tech Mahindra,

2 15845

Q2) Can we ADD an organisational element in a role? If yes how??

HP,

2 8883

Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?

HP,

2 13732

Q4) What are the limitations of ST01? Explain in detail?

HP,

2 10609


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4424


Explain protecting public keys?

889


What is the difference between usobx_c and usobt_c?

818


what is use of copy data in derived role and when we use this one ???

1523


What is audit information system?

891


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4214


what is the use of defaults tab in start menu

1593


Can you explain internet-level security?

870


What authorization is required to create and maintain user master records?

871


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2577


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

2946


What are the uses of an authorization group?

923


Explain transport system-level security?

886


what is hypercare and go live support?

5042


How can sap security be improved?

868