Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

which ticketing tool you are using?

Answer Posted / employee

Service Now

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2484


What is the difference between the table buffer and the user buffer?

1229


Can you explain transport system-level security?

1243


What are the most used tables in sap?

1218


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1065


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2450


How we Educated client personnel in R/3 Security and general Basis knowledge

2276


By which parameter number of entries are controlled in the user buffer?

1400


What are se09 t-codes used for?

1309


Can you explain protecting public keys?

1065


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1324


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4263


Can wildcards be used in authorizations?

1203


When would you update a sap table directly?

1081


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133