1) Explain me about your SAP Career?
2) Tell me your daily monitoring jobs and most of them you
worked on?
3) which version of SAP are you working on? Is it a java
stack or abap stack?
4) Tell me about derived role?
5) what is the main difference between single role and a
derived role
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
7) Tell me the steps to configure CUA?
8) Is RAR a java stack or Abap Stack?
9) What is the report which states the critical T-codes? and
also What is the T-code?
10) What is the T-code to get into RAR from R/3?
11) Explain about SPM?
Answer Posted / sudha
4) Tell me about derived role?
Ans:Derived roles..To restrict the user access based on
organizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
5) what is the main difference between single role and a
derived role?
Ans:Main difference--we can add/delete the tcodes for the
single roles but we cann't do it for the derived roles.
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
Ans:If we do the adjusted derived role in the master role
while updating the values in the master role thn values will
be reflected in the child roles.
10) What is the T-code to get into RAR from R/3?
Ans:/virsar/ZVRAT
11: Explain about SPM?
Ans:SPM can be used to maintain and monitor the super user
access in an SAP system. This enables the super-users to
perform emergency activities and critical transactions
within a completely auditable environment. The logs of the
SPM user IDs helps auditors in easily tracing the critical
transactions that have been performed by the Business users
| Is This Answer Correct ? | 11 Yes | 1 No |
Post New Answer View All Answers
What is the difference between usobx_c and usobt_c?
What are pfud t-codes used for?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What is the difference between c (check) and u (unmaintained)?
How to assign any program to user?
what is user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is the critical issue u are faced in your previous experience
Which transaction should not be given to BASIS and DEV team in Production?
Can you explain internet-level security?
explain the personalization tab within a role?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What are the uses of an authorization group?