Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the rule set in GRC?

Answer Posted / ravi shankar

The Rules Generated from the Risk are called Rule set.( Common Rule Set Is called Global ).

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what things you have to take care before executing run system trace?

1188


List the various user types.

1011


What authorization are required to create and maintain user master records?

1062


Pfcg proposed activities but you need only two. What would you do?

1070


What are su53 t-codes used for?

1273


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

2157


What are st01 t-codes used for?

1105


What does the item category specify in a purchasing order in SAP Materials Management?

1327


What are su56 t-codes used for?

1184


Tell me about derived role?

1010


what is the main difference between the derived role and a single role?

1089


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1081


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2268


What are the different types of sap security tables?

1052


What is the difference between c (check) and u (unmaintained)?

1784