What are the main components of the authorization concept?
A. Authorization object class
B. Authorization object
C. Authorization field
D. Authorization
E. Authorization profile
F. Consultant
Which 2 tables control the behavior of the Profile Generator after the transaction has been selected?
A. RZ11
B. USOBX_C
C. USOBT_C
D. USOBX
What are the 3 major components of the Role maintenance tool (PFCG)?
A. menu
B. authorizations
C. users
D. profile
Which transaction allows you to maintain the profile parameters?
A. RZ11
B. RZ12
C. RZ13
In which 4 cases Secure Store and Forward (SSF) provides security for SAP data and documents?
A. Data leaves the SAP system
B. Data is stored on insecure media
C. Data is transmitted over insecure networks
D. Data security is associated with persons and individuals
E. Data book is associated with persons
Which profile parameter set the time for automatic SAPGUI logout?
A. rdisp/gui_auto_Signin
B. rdisp/gui_auto_logout
Which program start the external command after it has passed the gateway?
A. gw/sec_info
B. Sapxpg
C. S_RZL_ADM
ITS: What are the 4 main functions of the A gate?
A. Communication to and from the SAP system
B. Communicates using the SAP protocols RFC and DIAG.
C. Data security is associated with persons and individuals
D. Generating the HTML pages from SAP screens
E. Managing user logon data and session information
How do you protect access to the ITS service and template files?
A. Using groups at the operating system level
B. Using groups at the creation dolmen level
x.509
client certificates: which table is responsible for the user mapping?
A.
USREXTID
B.
UDBNVVD
C.
UFSKSDHD