C Sec
C Sec
C_SEC_2405
SAP Security Administrator Questions
Correct Answer: 1
Question: 2
Which ABAP transaction codes are relevant for SNC parameter configuration? (2 correct)
1.) SNCWIZARD
2.) STRUST
3.) SNCCONFIG
4.) SNCO
Question: 3
Which of the following describe SAP Fiori Tile Target Mapping? (2 correct)
Question: 4
Which of the following objects allows you to restrict which users can distribute a role to
another system using an RFC destination?
1.) S_USER_AGR
2.) S_USER_SYS
3.) S_USER_AUT
4.) S_USER_STA
Correct Answer: 2
Question: 5
What is the purpose of SAP Notes listed by SAP Solution Manager System
Recommendations? (2 correct)
Question: 6
1.) The SAP_NEW must be generated in accordance with the system environment using
the report REGENERATE_SAP_NEW
2.) The profile SAP_NEW provides authorizations to all new objects and objects change by
release
3.) The role SAP_NEW does not guarantee backward capability for all scenarios
4.) Organizational levels to be maintained in profile SAP_NEW
Question: 7
Which of the following transaction allow you to customize or configure SAP Fiori Catalogs
and Groups? (2 correct)
1.) /UI2/FLPD_CUST
2.) /UI2/FLPCM_CUT
3.) /UI2/FLPD_CONF
4.) /UI2/FLPCM_CONF
Question: 8
Your system is configured to prohibit a user from logging on multiple times to the system
with the same User ID in violation of your SAP licensing agreement. However, certain
users need to be exempt from this limitation. Which instance parameter can you configure
to allow small group of user to bypass the limitations of multiple logins?
1.) login/disable_multi_rfc_login
2.) login/disable_multi_gui_lgoin
3.) Login/server_logon_restriction
4.) Login/ multi_login_users
Correct Answer: 4
Question: 9
Which archiving object can you use for archiving change documents related to changes
with authorizations assigned to user?
1.) US_PROF
2.) US_AUTH
3.) US_PASS
4.) US_USER
Correct Answer: 4
Question: 10
You are Configuring authorizations to secure access to table data using transaction SM31
and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this
field be use to secure access?
1.) It allows you to specify access to tables associated with a specific authorization group
2.) It allows you specify access to specific client-dependent table
3.) It allows you specify access to a specific client independent table
4.) It allows you specify access to tables reference by a specific program group
Correct Answer: 1
Question: 11
Which of the following actions are required to ensure complete logging of table data
changes? (3 correct)
1.) The security log must be activated using transaction SM19
2.) Client change option must be set to Automatic Recording of changes
3.) Instance profile parameter rec/client must be maintained for client
4.) Log Data changes must be enable at the table level in transaction SE13
5.) Parameter RECCLIENT must be maintained in transaction STMS
Question: 12
Which of the following phases in SAP AUDIT MANAGEMENT auditing process? (3 correct)
Question: 13
Question: 14
1.) Monthly
2.) Yearly
3.) Weekly
4.) Quarterly
Correct Answer: 1
Question: 15
1.) Job
2.) Person
3.) Organizational Unit
4.) Task
5.) Position
Question: 16
Question: 17
Which application allows a role developer to perform the mass maintenance of menu
options from selected SAP Fiori Title Catalogs?
1.) PRGN_PRINT_AGR_MENU
2.) PRGN_COMPARE_ROLE_MENU
3.) PRGN_CREATE_FIORI_FRONTENDROLE
4.) PRGN_CREATE_FIORI_BACKENDROLES
Correct Answer: 3
Question: 18
When you are troubleshooting an application start issue, what does the Search Startable
Application in Roles report help you determine? (2 correct)
1.) If the PFCG roles contains all the start authorizations required for the application
2.) If the PFCG menu contains SAP Fiori Tile Group
3.) If there is an application start lock
4.) If the PFCG roles assigned to end user
Question: 19
You want to adjust check indicator values for certain authorization object delivered by
SAP. In which of the following tables should your adjustments be recorded?
1.) USOBX_C
2.) USOBT_C
3.) USOBHASH
4.) USOBX
Correct Answer: 1
Question: 20
Which of the following authorization objects are used to secure the execution of External
Commands when a defining a background job step? (2 correct)
1.) S_LOG_COM
2.) S_PROGRAM
3.) S_BTCH_EXT
4.) S_RZL_ADM
Question: 21
How can you enforce an additional transaction start authorization check for custom
transaction?
1.) Without additional custom development it is not possible to add another check during
transaction start.
2.) Maintain the SU24 entry for the custom transaction and adding the desired
authorization object, setting the Check Indicator to "Check" and setting Proposal to Yes.
3.) For each role containing the custom transaction, add the desired authorization object
manually in transaction PFCG, maintained the field values and then generate the profile.
4.) Transaction SE93 the custom transaction definition the Using , update by specifying
desired authorization object and maintaining the desired field values.
Correct Answer: 2
Question: 22
Question: 23
1.) S_USER_AGR
2.) S_USER_SYS
3.) S_USER_AUT
4.) S_USER_VAL
Correct Answer: 1
Question: 24
Which transaction code allows you to configure the SAP System Audit Log?
1.) SM20
2.) SM19
3.) SM18
4.) SUIM
Correct Answer: 2
Question: 25
Which of the following illustrate the simplification of users and role maintenance on SAP
Cloud?
1.) Business roles are automatically provisioned.
2.) Business users have business roles.
3.) Templates are provided for role derivation.
4.) Read and write access can be restricted.
Correct Answer: 2
Question: 26
How can you protect a system when you do not want the user assignments for a role to be
transported?
1.) Restrict access to the user assignment tab in PFCG in the target system
2.) Restrict import of users in table PRGN_CUST in the target system
3.) Restrict import of users in table PRGN_CUST in the development system
4.) Restrict access to the user assignment tab in PFCG in the Development system
Correct Answer: 2
Question: 27
Which of the following features are provided by the SAP Fiori Launchpad content
Manager? (3 correct)
Question: 28
Which values are permitted for the S_BTCH_JOB authorization object? (3 correct)
1.) SHOW
2.) RELE
3.) 01 (Create)
4.) 02 (Change)
5.) DELE
Question: 30
Which of the following user types are precluded from logging in to system directly? (3
correct)
1.) Service
2.) System
3.) Communication
4.) Reference
5.) Dialog
Question: 31
Which of the following SUIM report can you use to determine if a user has segregation of
duty violation? (2 correct)
Question: 32
The report "Search for Application in Role Menu" can be called via which of the following
options? (2 correct)
1.) Transaction SUIM (menu node "Roles")
2.) Transaction RSUSR_ROLE_MENU
3.) Transaction RSUSR_START_APPL
4.) Transaction SUIM, (Menu node " Change Documents")
Question: 33
Which of the following parameter must be configured to capture log data in the Security
Audit log?
1.) rec/client
2.) rsau/enable
3.) rdisp/TRACE
4.) dirjogging
Correct Answer: 2
Question: 34
In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the
following data sources for storing user data? (3 correct)
Question: 35
Which of the transaction allows a user to change the authorization values of multiple roles
at same time?
1.) PFCGROLEDIST
2.) SUPC
3.) PFCGMASSVAL
4.) PFCG
Correct Answer: 3
Question: 36
What are the main features of SAP Enterprise Threat Detection (ETD)? (3 correct)
Question: 37
Which of the following checks performed for SAProuter by the SAP security optimization
service (SOS)? (3 correct)
Question: 38
Which of the following describe the behavior of a reference user when assigned to a user
master record? (2 correct)
1.) The reference user roles are directly assigned to the user master record.
2.) The roles of the reference user are always hidden.
3.) The roles of the reference user can be shown.
4.) The user master record references the role and authorizations assigned to the
reference user.
Question: 39
SAP Cloud Identity and Access Governance consists of which of the following software
services? (3 correct)
Question: 40
Which of the following actions are correctly describes the usage of Front Channel Single
Sign-On based on (SAML) 2.0? (2 correct)
1.) The identity provider queries the user for authentication credentials
2.) The identity provider presents the requested resource to the user
3.) The identity provider returns the user to service providers with an authentication
request
4.) The service provider queries the user for authentication credentials
Question: 41
1.) Groups
2.) Privileges
3.) Single technical roles.
4.) Business Roles
Correct Answer: 4
Question: 42
Which of the various protocols can be used to establish secure communication? (3 correct)
Question: 43
Correct Answer: 1
Question: 44
You want to turn off the SAP menu on Easy Access Menu Screen. What administrative
function do you need in Authorization Object S_USER_ADM ?
1.) PRGN_CUST
2.) USR_CUST
3.) USR_CUST_S
4.) SSM_CUST
Correct Answer: 4
Question: 45
Which of the following actions correctly describes the usage of Back Channel Single Sign-
On based on (SAML) 2.0?
1.) The service provider get the authentication request from the identity provider over a
SOAP channel.
2.) The service provider queries the user for authentication credentials.
3.) The identity provider get the authentication response from the service provider over a
SOAP channel.
4.) The service provider redirects the user to an identity provider and includes a SAML
artifact referring to authentication request.
Correct Answer: 4
Question: 46
Which UCON phase blocks the access to RFC Function Modules without an assigned
Communication Assembly?
1.) Configuration
2.) Logging
3.) Activation
4.) Evaluation
Correct Answer: 4
Question: 47
Which of the following Correctly describe the SAP Security Optimization Service (SOS)
Offering? (3 correct)
Question: 48
Correct Answer: 4
Question: 49
What is the main purpose of SAP Access Control, as an enterprise software solution?
Question: 50
What is the equivalent of the AS ABAP user type System in the AS JAVA UME security
policy?
Correct Answer: 4
Question: 51
Which of the following technical capabilities does SAP Code Vulnerability Analysis
provide? (2 correct)
Question: 52
Which CDS- related repository object types are provided with ABAP CDS? (3 correct)
Question: 53
Question: 54
1.) SICF
2.) SPRO
3.) SWI5
4.) SUIM
Correct Answer: 1
Question: 55
Which of the following conditions apply when merging authorizations for the same object?
(2 correct)
1.) Changed authorizations can be merged with manual authorizations, even if the
activation status is different
2.) Changed authorizations can be merged with manual authorizations, as long as the
activation status is the same
3.) Both activation status and maintenance status of the authorizations match
4.) Both activation status and maintenance status of the authorizations do not match
Question: 56
If the OData back-end service is located on a remote back-end users need which
authorization object to perform the RFC call on the back-end system? (2 correct)
1.) S_START
2.) S_SERVICE
3.) S_RFCACL
4.) S_RFC
Which TADIR Service Object type includes business functional authorization objects used
within the OData execution?
1.) IWSG
2.) IWSC
3.) OSOD
4.) IWSV
Correct Answer: 1
Question: 58
When building a PFCG role for SAP Fiori access on an embedded front-end server
configuration, which of the following item should be provided? (3 correct)
Question: 59
Question: 60
You are responsible for determining the reason why you need personal data and how this
data is processed or stored. What key role do you play under GDPR in relation to personal
data?
Correct Answer: 2
Question: 61
Which of the following are prerequisites for using transaction PFCG? (2 correct)
1.) Fill Initial values for customer tables using transaction SU25
2.) Maintain parameter auth/no_check_in_some_cases = Y
3.) Generate Standard Role SAP_NEW using transaction SU25
4.) Maintain the Check Indicators for Critical Authorization objects
Question: 62
Correct Answer: 2
Question: 63
Which of the following table contains transport request object list and table entry keys? (2
correct)
1.) E071
2.) E070
3.) E070L
4.) E071K
Question: 65
Question: 66
Which of the following transaction allows you to define role assignments for 0 Data
Services that are available on multiple back-end systems? (2 correct)
1.) /IWFND/MAINT_SERVICE
2.) /IWFND/GW_SYS_ALIAS
3.) /IWFND/GW_CLIENT
4.) /UI2/GW_MAINT_SRV
Question: 67
Your company uses derived roles. During maintenance of the Plant Manager imparting
role, you add a new transaction to the Menu tab which introduces a new organizational
level that will be unique for each of your 150 plants. How will the new organization level
be maintained in the derived roles?
1.) Automatically using the Copy Data button during maintenance of the imparting role
2.) All at once using transaction PFCGMASSVAL
3.) Automatically after generating the profiles of the imparting role and adjusting the
derived roles
4.) Manually by maintaining each derived role individually
Correct Answer: 4
Question: 68
During maintenance of role you notice that the status text for an authorization object
indicates status "Changed New" What does this status text mean?
1.) The authorization object was used to create a new authorization because the value
contained in SU24 differ from the SAP standard contained in SU25
2.) The authorization object must be maintained again
3.) This authorization object has been flagged as critical object
4.) The authorization object was used to create a new authorization because the initial
configuration of the role change a default value maintained in SU24
Correct Answer: 4
Question: 69
Which of the following are the examples of personal data under the GDPR? (3 correct)
1.) IP Address
2.) Email Address
3.) GPS data from Cellular phone
4.) Age Group
5.) Aggregated statistics on the use of a product
Question: 70
Which of the following allows you to improve the quality of your enterprise data assets
with consistent data validation rules, data profiling and metadata management?
1.) SAP Information Steward
2.) SAP Process Control
3.) SAP Information LifeCycle Management
4.) SAP Data Services
Correct Answer: 4
Question: 71
Which transaction codes are relevant to enable SNC between ABAP system? (3 correct)
1.) RZ10
2.) SNCO
3.) STRUST
4.) PFCG
5.) SU01
Question: 72
1.) SAP SOS self-service is a convenient entry point to introduce security monitoring.
2.) A system recommendation provide a worklist of potentially relevant security notes.
3.) Configuration validation can check if security policies were applied.
4.) SAP EWA provides the most comprehensive security check.
5.) Configuration validation helps to standardize and harmonize security related
configuration items for ABAP systems only.
Question: 73
Which of the following are SAP UI5 Fiori application types? (2 correct)
1.) Legacy
2.) Transactional
3.) Analytical
4.) Web Dynpro
1.) The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an
OData service
2.) The SRV_NAME Value of the S_SERVICE authorization object is the name of an OData
service
3.) Both front-end and back-end entries are generating the same S_SERVICE authorization
object with different authorization values
4.) Both front-end and back-end entries are generating the same S_SERVICE authorization
object with same authorization values
Question: 75
You want to limit an authorization administrator so that they can only assign certain
authorizations. Which authorization object should you use?
1.) S_USER_VAL
2.) S_USER_ADM
3.) S_USER_AGR
4.) S_USER_TCD
Correct Answer: 3
Question: 76
The DBMS tab in transaction SU01 allows you to manage database privilege assignments
for which of the following scenarios? (2 correct)
Question: 77
What content can be shared between SAP Access Control and SAP Cloud Identity and
Access Governance products? (3 correct)
1.) Mitigations
2.) Process Hirarchy
3.) Mitigation Control
4.) Risk Library
5.) Emergency Access
Question: 78
Which of the following authorization objects would be required to allow back-end server
access to a Web Dynpro application using the SAP Fiori Launchpad?
1.) S_TCODE
2.) S_START
3.) S_SERVICE
4.) S_PERSONAS
Correct Answer: 3
Question: 79
Which of the following are used in SAP Enterprise Threat Detection ( ETD) architecture?
(2 correct)
Question: 80
Which of the following app-specific types of entities do users need to use SAP Fiori apps?
(2 correct)
Question: 81
Which cloud-based SAP solution helps organizations control their data across various
cloud platforms and on-premise data sources?
Correct Answer: 3
Question: 82
Correct Answer: 2
Question: 83
What happens to data within SAP Enterprise Threat Detection during the aggregation
process? (3 correct)
1.) It is prioritized.
2.) It is pseudonymized.
3.) It is categorized.
4.) It is normalized.
5.) It is enriched.
Question: 84
Question: 85
Which of the blowing functions within SAP GRC Access Control support access
certification and review? (2 correct)
Question: 86
Correct Answer: 1
Question: 87
Which solution is NOT used to identify security recommendations for the SAP Security
Baseline?
Correct Answer: 1
Question: 88
Which functions in SAP Access Control can be used to approve or reject a user's continued
access to specific security roles? (2 correct)
Question: 89
1.) Repudiation
2.) Identity Authentication
3.) Encryption
4.) Information Integrity
Question: 90
When segregating the duties for user and role maintenance, which of the following should
be part of a decentralized treble control strategy for a production system? (3 correct)
Question: 91
In the administration console of the Cloud Identity Services, which system property types
can you add? (2 correct)
1.) Standard
2.) Internal
3.) Credential
4.) Default
Question: 92
In the administration console of the Cloud Identity Services, for which system type can
you define both read and write transformations?
Correct Answer: 3
Question: 93
Correct Answer: 3
Question: 94
Correct Answer: 3
Question: 95
Question: 96
Correct Answer: 2
Question: 97
Which of the following services does the Identity Authentication Service provide? (2
correct)
1.) Authentication
2.) Single Sign-On
3.) Central User Repository
4.) Policy refinement
Question: 98
What use cases are available for a Local Identity Directory? (3 correct)
Question: 100
1.) Cryptlib
2.) SecLib
3.) SAPCRYPTOLIB
4.) CommonCryptoLib
Question: 101
What can be assigned directly to a user when using the SAP Launchpad service in SAP
BTP?
Correct Answer: 2
Question: 102
Which protocol is the industry standard for provisioning identity and access management
in hybrid landscapes?
1.) SCIM
2.) SAML
3.) SSL
4.) OIDC
Correct Answer: 1
Question: 103
Which log types are available in the Administration Console of Cloud Identity Services? (2
correct)
Question: 104
What does SAP Key Management Service (KMS) do to secure cryptographic keys? (3
correct)
Question: 105
In the SAP BTP Cockpit, at which level is Trust Configuration available? (2 correct)
Question: 106
Question: 107
Which tool can you use to modify the entities schema content across multiple repositories?
Correct Answer: 4
Question: 108
Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you
perform a Modification Comparison using SU25. What does this comparison do?
1.) It compares your changes to the SAP defaults in USOBX and USOBT with the new SAP
defaults in the current release and allows you to make adjustments.
2.) It compares the Role Maintenance data from the current release with the data for the
previous release and allows you to adjust any custom default values in tables USOBX and
USOBT.
3.) It compares the Role Maintenance data from the previous release with the data for the
current release and writes any new default values in tables USOBX_C and USOBT_C.
4.) It compares your changes to the SAP defaults in USOBX_C and USOBT_C with the new
SAP defaults in the current release and allows you to make adjustments.
Correct Answer: 1
Question: 109
Which of the following allow you to control the assignment of table authorization groups?
(2 correct)
1.) PRGN_CUST
2.) V_DDAT_54
3.) V_BRG_54
4.) SSM_CUST
Question: 110
1.) They can only create objects in their own database schema.
2.) They can only connect to the database using HTTP/HTTPS.
3.) They only have full SQL access via the SQL console.
4.) They cannot connect via ODBC or JDBC.
5.) They cannot create objects in the database.
Question: 111
When performing a comparison from the imparting role, what happens to the
organizational level field values in the derived role? (2 correct)
1.) Data for organizational levels is always transferred when authorization data for the
derived role is modified.
2.) Data for organizational levels that have already been maintained in the derived role is
NOT overwritten.
3.) Data for organizational levels is transferred only when authorization data for the
derived role is first modified.
4.) Data for organizational levels that have already been maintained in the derived role is
overwritten.
Question: 112
What authorization object can be used to restrict which users a security administrator is
authorized to maintain?
1.) S_USER_GRD
2.) S_USER_AUTO
3.) S_USER_SASO
4.) S_USER_GRP
Correct Answer: 4
Question: 113
Correct Answer: 4
Question: 114
What does a status text value of "Old" mean during the maintenance of authorizations for
an existing role?
Correct Answer: 2
Question: 115
What must you do before you can use transaction PFCG? (2 correct)
1.) Fill tables USOBT and USOBX with the SAP-delivered authorization default values.
2.) Set the system profile parameter auth/no_check_in_some_cases to Y.
3.) Fill tables USOBT_C and USOBX_C with the SAP-delivered authorization default
values.
4.) Set the system profile parameter auth/no_check_in_some_cases to N.
Question: 116
Your developer has created a new custom transaction for your SAP S/4HANA on-premise
system and has provided you a list of the authorizations needed to execute the new ABAP
program. What must you do to ensure that each required authorization is automatically
created every time this new custom transaction is added to a PFCG role?
1.) Maintain each authorization object in transaction SU24 and set the Default Status to
"Yes".
2.) Maintain each authorization object in transaction SU22 and set the Default Status to
"Yes".
3.) Maintain each authorization in transaction SU24 and set the Default Status to "Yes".
4.) Maintain each authorization in transaction SU22 and set the Check Indicator value to
"Check".
Correct Answer: 1
Question: 117
What must you do if you want to enforce an additional authorization check when a user
starts an SAP transaction?
1.) Assign authorization object S_START to the chosen transaction code with transaction
SU24 and specify the Program ID and Object Type.
2.) Assign the authorization object to be checked to the chosen transaction code in the
SAP Default authorization data using transaction SU22 and set Check Indicator to
"Check".
3.) Assign the authorization object to be checked to the chosen transaction code with
transaction SU24 and set Default Status to "Yes".
4.) Assign the authorization object and permissions to the chosen transaction code using
transaction SE93.
Correct Answer: 1
Question: 118
Which of the following rules does SAP recommend you consider when you define a role-
naming convention for an SAP S/4HANA on-premise system? (3 correct)
Where can you find information on the SAP-delivered default authorization object and
value assignments? (2 correct)
1.) USOBT_C
2.) USOBT
3.) SU22
4.) SU24
Question: 120
After you maintained authorization object S_TABU_DIS and ACTVT field value 02 as
authorization defaults for transaction SM30 in your development system, what would be
the correct option for transporting only these changes to your quality assurance system?
1.) Save your changes to a Workbench transport request and transport using the
Transport Management System.
2.) Save your changes to a Customizing transport request and transport using the
Transport Management System.
3.) Save tables USOBT_C and USOBX_C to a transport request and transport using the
Transport Management System.
4.) Save your changes and use the transport interface in SU25 to transport the changes
using the Transport Management System.
Correct Answer: 1
Question: 121
Which optional components can be included when transporting a role definition from the
development system to the quality assurance system? (3 correct)
1.) Application
2.) Package
3.) System
4.) Analytic
5.) Object
Question: 123
Under which of the following conditions can you merge authorizations for the same object
during role maintenance? (2 correct)
1.) The maintenance status of the changed authorizations must match the status of a
manual authorization.
2.) The activation status and the maintenance status of the authorizations must match.
3.) The activation status and the maintenance status of the authorizations must NOT
match.
4.) The activation status of a manual authorization must match the status of the changed
authorizations.
Question: 124
1.) Changes to the authorizations can only be made using the included roles.
2.) Transactions that are deleted from the Composite Role menu are also removed from
the included roles.
3.) Changes to the included roles are not immediately visible in the composite role menu,
requiring a renewed import.
4.) Menus from the included roles cannot be mixed.
Question: 125
For users with system administration authorization, which additional functions are
provided by the SAP Easy Access menu? (2 correct)
1.) Creating users
2.) Calling programs
3.) Creating roles
4.) Calling menus for roles and assigning them to users
Question: 126
1.) S_USER_AUT
2.) S_USER_VAL
3.) S_USER_AGR
4.) S_USER_TCD
Correct Answer: 1
Question: 127
Which code does the authority-check return when a user does NOT have any
authorizations for the authorization object checked?
1.) 12
2.) 16
3.) 0
4.) 4
Correct Answer: 1
Question: 128
Correct Answer: 1
Question: 129
You are evaluating startable applications. Which of the following can you use to check if
there is an application start lock on an application contained in a PFCG role? (2 correct)
Question: 130
You are building a PFCG role for access to an SAP Fiori app on your SAP S/4HANA on-
premise system. After you enter the catalog in the role menu, an entry for an OData
service is missing and you have to add it manually to the role menu. When you maintain
authorization data in the PFCG role, why does SAP recommend that you NOT maintain the
SRV_NAME field value of the S_SERVICE authorization object manually?
1.) Because the TADIR Service name is the same for the front-end server component and
the back-end server component.
2.) Because the TADIR Service name for the back-end server component was
automatically added to the role menu.
3.) Because the SRV_NAME hash value for the front-end server component and back-end
server component are the same.
4.) Because the SRV_NAME hash value for the front-end server component and back-end
server component are different.
Correct Answer: 2
Question: 131
When creating PFCG roles for SAP Fiori access, what is included automatically when
adding a catalog to the menu of a back-end PFCG role? (2 correct)
1.) The start authorizations and the authorization default values for each IWSG TADIR
service definitions in the catalog.
2.) The start authorizations and the authorization default values for each IWSV TADIR
service definitions in the catalog.
3.) The IWSG TADIR service definitions from the catalog.
4.) The IWSV TADIR service definitions from the catalog.
1.) Spaces
2.) SAP GUI
3.) Web Dynpro
4.) User Actions Menu
Question: 133
How does Rapid Activation support customers during the SAP S/4HANA on-premise
implementation process? (3 correct)
1.) By helping customers to start exploring SAP Fiori in SAP S/4HANA on premises as
quickly as possible.
2.) By supporting content activation at the business role level, including SAP Fiori apps
and all associated Web Dynpro for ABAP applications.
3.) By allowing customers to select individual SAP Fiori apps for their end-to-end business
processes.
4.) By allowing customers to select and activate SAP Fiori apps one by one, independent
of dependencies needed for app-to-app navigation.
5.) By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.
Question: 134
What is the authorization object required to define the start authorization for an SAP Fiori
legacy Web Dynpro application?
1.) S_SDSAUTH
2.) S_START
3.) S_TCODE
4.) S_SERVICE
Correct Answer: 2
Question: 135
To connect to data sources that are NOT all based on OData, which of the following
options does SAP recommend you use?
Correct Answer: 2
Question: 136
An authorization based on what object is required for trusted system access to an SAP
Fiori back-end server?
1.) S_RFC
2.) S_RFCACL
3.) S_SERVICE
4.) S_START
Correct Answer: 2
Question: 137
1.) A CDS role with access conditions based on authorization object S_RS_AUTH, APFCG
role with authorization for object S_RS_AUTH and assignment of the PFCG role, The CDS
role to the business user.
2.) A CDS role with access conditions based on authorization object S_RS_AUTH , APFCG
role containing the CDS role and access conditions based up authorization object
S_RS_AUTH , Assignment of the PFCG role to the business user.
3.) ACDS role with access conditions based on authorization object S_RS_AUTH , A PFCG
role with authorization for object S_RS_AUTH , Assignment of the PFCG role to the
business user.
4.) A CDS role with access conditions based on authorization object S_RS_AUTH , APFCG
role containing the CDS role and access conditions based up authorization object
S_RS_AUTH , Assignment of the PFCG role and the CDS role to the business user.
Correct Answer: 2
Question: 138
When you maintain authorizations for SAPUI5 Fiori apps, which of the following object
types is the front-end authorization object type?
1.) TADIR G4BA-SAP Gateway OData V4 Backend Service Group & Assignments
2.) TADIR IWSV - SAP Gateway Business Suite Enablement-Service
3.) TADIR IWSG - SAP Gateway: Service Groups Metadata
4.) TADIR INA1 InA Service
Correct Answer: 2
Question: 139
1.) IWSV
2.) G4BA
3.) IWSG
4.) HTTP
Correct Answer: 1
Question: 140
Correct Answer: 3
Question: 141
Which authorization objects can be used to restrict access to SAP Enterprise Search
models in the SAP Fiori launchpad? (2 correct)
1.) S_ESH_CONN
2.) SDDLVIEW
3.) S_ESH_ADM
4.) RSDDLTIP
Correct Answer: 1,2
Question: 142
Where can you find SAP Fiori tiles and target mappings according to segregation of duty?
Correct Answer: 4
Question: 143
If you want to evaluate catalog menu entries and authorization default values of IWSG and
IWSV applications, which SUIM reports would you use? (2 correct)
Question: 144
What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public
Edition? (3 correct)
Question: 145
Which user type in SAP S/4HANA Cloud Public Edition is used for API access, system
integration, and scenarios where automated data exchange is required?
1.) SAP Communication User
2.) SAP Technical User
3.) SAP Administrative User
4.) SAP Support User
Correct Answer: 1
Question: 146
What does SAP recommend you do when you transport a custom leading business role in
SAP S/4HANA Cloud Public Edition?
1.) Add all other leading business roles from the same Line of Business as dependencies to
the Software Collection.
2.) Add all derived business roles as dependencies to the Software Collection.
3.) Add the pre-delivered business role that was used as a template to create the custom
leading business role to the Software Collection.
Correct Answer: 2
Question: 147
Which application in SAP S/4HANA Cloud Public Edition allows you to upload employee
information independent of the customers' HR system?
Correct Answer: 3
Question: 148
When planning an authorization concept for your SAP S/4HANA Cloud Public Edition
implementation, what rules must you consider? (2 correct)
1.) SAP Fiori apps, dashboards, and displays can be assigned directly to a business role.
2.) Business catalogs can be assigned directly to a business user.
3.) Business roles can be assigned directly to a business user.
4.) Business catalogs can be assigned directly to a business role.
In SAP S/4HANA Cloud Public Edition, what does the ID of an SAP-predefined Space refer
to?
Correct Answer: 2
Question: 150
Which access categories are available to maintain restrictions in SAP S/4HANA Cloud
Public Edition? (3 correct)
Question: 151
In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization
Trace? (3 correct)
Question: 152
In SAP S/4HANA Cloud Public Edition, which of the following can you change in a derived
business role if the "Inherit Spaces in Derived Business Roles" checkbox is NOT selected
in the leading business role?
Correct Answer: 3
Question: 153
Which user types can log on to the SAP S/4HANA system in interactive mode? (2 correct)
Question: 154
In SAP HANA Cloud, what can you configure in user groups? (2 correct)
Question: 155
Which archiving objects are relevant for archiving change documents for user master
records? (2 correct)
1.) US_PROF
2.) US_USER
3.) US_AUTH
4.) US_PASS
What is the correct configuration setting in table PRGN_CUST for user assignments when
transporting roles within a Central User Administration scenario?
Correct Answer: 4
Question: 157
Which of the following user types are excluded from some general password-related rules,
such as password validity or initial password? (2 correct)
1.) Dialog
2.) System
3.) Communication
4.) Service
Question: 158
What is required to centrally administer a user's master record using Central User
Administration? (3 correct)
Question: 159
Which SU01 user types are NOT enabled for interaction? (2 correct)
1.) Service
2.) System
3.) Dialog
4.) Communications Data
Question: 160
Which entities share data with Business Partners in the S/4HANA Business User Concept?
(2 correct)
1.) Employer
2.) Administrator
3.) User
4.) Employee