Does anyone know what kind of questions does the Accenture
asks on Interview as SAP Security Consultant?
Answer Posted / kingraj
they stress on mainly BI security apart from R/3
Is This Answer Correct ? | 2 Yes | 2 No |
Post New Answer View All Answers
What are pfud t-codes used for?
when performing client copies what steps you need to take from CUA point of view?
what is the use of defaults tab in start menu
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Can wildcards be used in authorizations?
Can you explain internet-level security?
What profile versions?
What is the difference between usobx_c and usobt_c?
What is the maximum number of profiles in a role and maximum number of object in a role?
what is use of copy data in derived role and when we use this one ???
What authorization are required to create and maintain user master records?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is the main purpose of parameters, groups & personalization tabs?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What authorization is required to create and maintain user master records?