Pass4itsure > SAP > SAP Certifications > C_SECAUTH_20 > C_SECAUTH_20 Online Practice Questions and Answers

C_SECAUTH_20 Online Practice Questions and Answers

Questions 4

During maintenance of a role you notice that the status text for an authorization object indicates status "Changed New". What does this status text mean?

A. The authorization object has been flagged as a critical object.

B. The authorization object must be maintained again.

C. The authorization object was used to create a new authorization because the initial configuration of the role changed a default value maintained in SU24.

D. The authorization object was used to create a new authorization because the values contained in SU24 differ from the SAP Standard contained in SU25.

Buy Now
Questions 5

Which of the following accurately describes the role/profile SAP_NEW? (Choose two.)

A. The profile SAP_NEW provides authorization for all new objects and objects changed by release.

B. Organizational levels need to be maintained in profile SAP_NEW.

C. The role SAP_NEW does not guarantee backward compatibility for all scenarios.

D. The role SAP_NEW must be generated in accordance with the system environment using the report REGENERATE_SAP_NEW.

Buy Now
Questions 6

Which values are permitted for the S_BTCH_JOB authorization object? (Choose three.)

A. DELE

B. 01 (Create)

C. RELE

D. SHOW

E. 02 (Change)

Buy Now
Questions 7

Which is the frequency of SAP Patch day?

A. Yearly

B. Quarterly

C. Weekly

D. Monthly

Buy Now
Questions 8

Where is the application log information (SLG1) saved?

A. In the location specified by the rsau/local/file parameter

B. In the directory specified by DIR_TRANS parameter

C. In the database

D. In the directory specified by DIR_LOGGING parameter

Buy Now
Questions 9

What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)

A. Monitoring of GDPR compliance

B. Segregation of Duty analysis

C. Forensic investigations

D. Realtime alerts

E. Monitoring of security events

Buy Now
Questions 10

Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.)

A. SAP IQ

B. SAP HANA Smart Data Streaming

C. SAP ASE D. Forensic lab

Buy Now
Questions 11

Which of the following defines "Phishing"?

A. Pretending to be another user

B. Acquiring sensitive information by masquerading as a trustworthy entity

C. Overloading an application with requests

D. Modifying an IP address of the source of the TCP/IP packet

Buy Now
Questions 12

What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.)

A. Mitigations

B. Risk library

C. Emergency access

D. Process hierarchy

E. Mitigation controls

Buy Now
Questions 13

Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.)

A. Data Destruction

B. Data Archiving

C. Data Retention

D. Data Logging

E. Alert Notification

Buy Now
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update:
Questions: 80
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99