SAP GRC (Governance Risk and Compliance) Interview Questions
Questions Answers Views Company eMail

What is the use of segregation of duties in sap system?

327

What do you understand by user buffers?

333

What is the maximum number of transaction codes that can be assigned to a user?

358

What is the landscape of grc system?

367

What are the different phases in grc risk management?

328

What is difference between preventive mitigation controls and detective mitigation controls?

388

Based on sod, what are the common roles and their key duties?

451

What is sod risk management?

340

Is it possible to lock all the users at same time in sap system?

380

What are the different activities that can be performed under iam?

372

What are the key activities that process control share with access control in grc?

378

What are the key capabilities that you can perform using superuser privilege management?

357

What are different process control areas that are shared with risk management?

350

What are the advantages of using global trade services?

345

What is the use of grc risk management?

324


Post New SAP GRC (Governance Risk and Compliance) Questions

Un-Answered Questions { SAP GRC (Governance Risk and Compliance) }

How can find out whether cua (central user administration) is configured on your sap system?

345


Explain about spm?

344


What is the use of report and analytics work center in grc?

335


Explain the use of grc risk management.

340


What are the different types of risk?

327






What is ruleset? And how to update risk id in rule set?

662


What are the different reports under process control?

349


What are the different phases under risk management in grc?

346


How do you perform risk classification?

336


What are the key capabilities that you can perform using superuser privilege management?

357


What are the key activities that process control share with access control in grc?

378


What are different process control areas that are shared with risk management?

350


What is rule building and validation under risk management?

335


What is the table name to store illegal password details in sap system?

345


What are the key activities under sap grc access control?

326