During maintenance of a role you notice that the status text for an authorization object indicates status "Changed New". What does this status text mean?
A. The authorization object has been flagged as a critical object.
B. The authorization object must be maintained again.
C. The authorization object was used to create a new authorization because the initial configuration of the role changed a default value maintained in SU24.
D. The authorization object was used to create a new authorization because the values contained in SU24 differ from the SAP Standard contained in SU25.
Which of the following accurately describes the role/profile SAP_NEW? (Choose two.)
A. The profile SAP_NEW provides authorization for all new objects and objects changed by release.
B. Organizational levels need to be maintained in profile SAP_NEW.
C. The role SAP_NEW does not guarantee backward compatibility for all scenarios.
D. The role SAP_NEW must be generated in accordance with the system environment using the report REGENERATE_SAP_NEW.
Which values are permitted for the S_BTCH_JOB authorization object? (Choose three.)
A. DELE
B. 01 (Create)
C. RELE
D. SHOW
E. 02 (Change)
Which is the frequency of SAP Patch day?
A. Yearly
B. Quarterly
C. Weekly
D. Monthly
Where is the application log information (SLG1) saved?
A. In the location specified by the rsau/local/file parameter
B. In the directory specified by DIR_TRANS parameter
C. In the database
D. In the directory specified by DIR_LOGGING parameter
What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)
A. Monitoring of GDPR compliance
B. Segregation of Duty analysis
C. Forensic investigations
D. Realtime alerts
E. Monitoring of security events
Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.)
A. SAP IQ
B. SAP HANA Smart Data Streaming
C. SAP ASE D. Forensic lab
Which of the following defines "Phishing"?
A. Pretending to be another user
B. Acquiring sensitive information by masquerading as a trustworthy entity
C. Overloading an application with requests
D. Modifying an IP address of the source of the TCP/IP packet
What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.)
A. Mitigations
B. Risk library
C. Emergency access
D. Process hierarchy
E. Mitigation controls
Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.)
A. Data Destruction
B. Data Archiving
C. Data Retention
D. Data Logging
E. Alert Notification