which ticketing tool you are using?
Answer Posted / karthikeyan
HP SERVICE CENTRE
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Differentiate between derived role and composite role
What is audit information system?
How to codify for an Item in SAP? How many digits are required for an item?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What are su53 t-codes used for?
how we do CUA configuration in Quality system
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
what is the process to find that one consultant had removed a table from sap tables
Support types of WOs you have faced?
What does the item category specify in a purchasing requisition in SAP Materials Management?
Explain secure store and forward?
how you can delete multiple roles from qa, dev and production system?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?