Does anyone know what kind of questions does the Accenture
asks on Interview as SAP Security Consultant?
Answer Posted / kingraj
they stress on mainly BI security apart from R/3
| Is This Answer Correct ? | 2 Yes | 2 No |
Post New Answer View All Answers
What does the pfcg_time_dependency clean up?
What does the item category specify in a purchasing requisition in SAP Materials Management?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
Support types of WOs you have faced?
What are su22 t-codes used for?
What happens to change documents when they are transported to the production system?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Can you explain protecting public keys?
Pfcg proposed activities but you need only two. What would you do?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to do Role Design, Testing and Implementation
explain the personalization tab within a role?