1.Is it possible to have a request type by which we can change
the validity period of a user?
If possible, then what are the actions?
Answer Posted / praveen
Hi, friends i can send some Grc Question plz send Answers.
4. What's the latest Support Pack for GRC 5.3? How it
differs from the previous one?
5. What are the issues faced by you in ERM & CUP after
golive?
6. Can we change Single roles, objects & Profile description
through mass maintenance of role? If yes, how?
7. What are the prerequisites for creating a workflow for
user provisioning?
8. How will you control GRC system if you have multiple
rulesets activated?
9. Can we view the changes of a role, happened in PFCG,
through GRC?
10. How will you mitigate a user against an authorization
object which is decided as sensitive by Business?
11. Give an example of SOD with object level control & also
decide the Risk implication from the Technical standpoint.
12. Is it possible to assign two roles with different
validity period to a user in one shot throughGRC? If yes,
how?
13. What's the use of Detour path? How Fork path differs
from Detour path?
14. How can you enable self password reset facility in GRC?
15. Can we have customized actions for creating request
types in CUP?
16. Which SOX rules got inherited in SAP GRC?
17. How many types of Background job you are familiar with?
Why Role/Profile & User Sync. job is required?
18. Where from can we change the default expiration time for
mitigating controls? What's the default value for the same?
19. How will you do the mass import of role in GRC?
20. Explain the total configuration & utility of SPM?
21. Can we create Logical systems in GRC? If yes, how & what
can be the advantages & disadvantages of the same?
22. Can we have different set of number ranges activated for
request generation?
23. Explain, how can we create derived roles in ERM? What
will be the significant changes in methodology for creating
composite roles?
24. Explain in detail how the different components of the
Access Controls suite integrate with each other
25.Explain the key problem areas in implementation of RAR
Is This Answer Correct ? | 1 Yes | 13 No |
Post New Answer View All Answers
Explain x-glueb and its use in sap security.
How to codify for an Item in SAP? How many digits are required for an item?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
what are all the questions covered in "profiles related concepts " please let me know ?
Support types of WOs you have faced?
What is a composite role?
when performing client copies what steps you need to take from CUA point of view?
How do you check background jobs?
how you can delete multiple roles from qa, dev and production system?
Why is it important to delete sap-new profile? What steps will you take to do this?
What are su56 t-codes used for?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Differentiate between temp role and copy role