Dear Readers, Welcome to SAP Security Objective Questions and Answers have been designed specially to get you acquainted with the nature of questions you may encounter during your Job interview for the subject of SAP Security Multiple choice Questions. These Objective type SAP Security are very important for campus placement test and job interviews. As per my experience good interviewers hardly plan to ask any particular question during your Job interview and these model questions are asked in the online technical test and interview of many IT & Non IT Industry.
A. AGR_DEFINE
B. AGR_1016
C. AGR_AGRS
D. AGR_1252
Ans: C
A. At least two authorization objects
B. No authorization object since this is a custom transaction code
C. At least one authorization object
D. None of the above
Ans: C
A. CREATE
B. DISPLAY
C. SUBMIT
D. VARIANT
Ans: A,B
A. RSUSR406
B. PFCG_TIME_DEPENDENCY
C. AGR_REGENERATE_SAP_ALL
D. RSUSR004
Ans: A,C
A. SM20
B. SM22
C. SM19
D. SM18
Ans: D
A. TSTCT
B. TACTZ
C. TBRG
D. TPGP
Ans: A
A. 06071995
B. 06071992
C. 06081992
D. None of the above
Ans: B
A. S_RFC
B. S_RFCACL
C. S_ICF
D. None of the above
Ans: C
A. Programs are cross-client data
B. A table may be client specific
C. Tcode RZ11 is used to maintain the profile parameters
D. None of the above
Ans: C
A. Check to see if the tcode exists in the SAP system or not
B. Check to see if the tcode is locked or not
C. Check in the user buffer to see if the user has necessary authorization objects with necessary field values as per the “Authority-Check” statements
D. Check in the user buffer to see if the authorization object S_TCODE contains the executed transaction code
Ans: B
A. AL11
B. SU56
C. AL08
D. SU53
Ans: B
A. agr_prof
B. agr_1016
C. agr_1250
D. agr_define
Ans: B
A. Service
B. Reference
C. Guest
D. System
Ans: C
A. Guest
B. All
C. System
D. KeystoreViewCreator
Ans: D
A. DIAG'--SSL
B. RFC--SSLS
C. HUP--SNCS
D. LDAP - SSL
Ans: D
A. The LDAP directory can either be connected as a read-only data source or as a writeable data source
B. The UME can support Users as a tree or a Flat hierarchy
C. The Distinguished Names (DNs) of user and group objects must not be longer than 240 characters.
D. If you are using an LDAP directory with a deep hierarchy, you can assign users or groups as members of another group using the UME user administration tools.
Ans: A
A. Additional data (for example, information about when a user was last changed)
B. Other principal types (for example, roles)
C. Groups (displayname, description, uniquename, and the group members)
D. User accounts (logonid, password, ID of the assigned user)
Ans: C
The above statement is: | SAP Security Mcqs
A. True
B. False
Ans: A
A. The number of failed logon attempts after which a user is locked, is defined in the security policy.
B. The UME security policy is independent of the security policy of the UME data source
C. You can define a security policy for the UME that is the same or stronger than the corresponding security policy in the backend system.
Ans: B
A. Generate the key pair on the server component.
B. Use a public-key certificate that is signed and issued by a CA
C. Make sure the client components trust the issuing CA.
D. It is necessary for the server to verify the identity of the client component
Ans: A,B,C