SAP SECURITY Training in Hyderbad,contact 7893255000.
R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
Answer Posted / sa
contact 7893255000
Is This Answer Correct ? | 3 Yes | 2 No |
Post New Answer View All Answers
how a t code works
What are se09 t-codes used for?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to insert missing authorization?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Differentiate between derived role and composite role
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Can you explain sap system transactions?
How can sap security be improved?
what is the main difference between the derived role and a single role?
How do you check background jobs?
How to find out who has deleted users in the system?
What is the difference between authorization object and authorization object class?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE