Weekend Special - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

A user has the authorization to execute SP01. What can this user access with authorization object S_ SPO_ ACT when the 'Value for Authorization Check' field is set to "_USER.

A.

All spool requests for all users in the client

B.

All spool requests for users in the same user group

C.

User's own spool requests

D.

All spool requests for a specific user in the client

Full Access
Question # 5

You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system. Which field distribution parameter do you maintain?

A.

Redistribution

B.

Local

C.

Global

D.

Proposal

Full Access
Question # 6

How can you register an SAP Gateway service? Note: There are 2 correct answers to this question.

A.

Use SAP_GAT EWAY_BASIC_CONFIG in transact on STCO 1 on the frontend server

B.

Use transaction /IWFND/MA INT_SERVICE on the front-end server

C.

Use SAP_GAT EWAY_ACTIVATE_ODATA_SERV in transact on STC01 on the front-end server

D.

Use transaction SEGW on the back-end server

Full Access
Question # 7

How can you protect a table containing sensitive data using the authorization object S_TABU_DIS?

A.

The tables containing sensitive data must be associated with table groups in table TBRG.

B.

The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.

C.

Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables

D.

The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can

then be filled with *.

Full Access
Question # 8

What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.

A.

Configuration check of the SAP systems and the SAP middleware components against defined configurations

B.

Results with recommendations on how to resolve identified vulnerabilities without prioritization

C.

Analysis of security vulnerabilities within an enterprise's SAP landscape to ensure optimal protection against intrusions

D.

Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability

Full Access
Question # 9

Why do you use table logging in AS ABAP?

A.

To log changes in application data

B.

To log changes in master data

C.

To log changes in table technical settings

D.

To log changes in customizing tables

Full Access
Question # 10

Which OData authorizations are required for a user to see business data in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.

A.

Start authorization in the SAP Fiori front-end system

B.

Access authorization in the SAP Fiori front-end system

C.

Access authorization in the SAP S/4HANA back-end system

D.

Start authorization in the SAP S/4HANA back-end system

Full Access
Question # 11

How do you handle user "SAP 'in AS ABAP? Note: There are 3 correct answers to this question.

A.

Remove all authorizations from the user

B.

Lock and expire the user in all clients

C.

Set profile parameter login/no_automatic_user_sapstar to 0

D.

Set profile parameter login/no_automatic_user_sapstar to 1

E.

Lock and expire the user in all clients except 000

Full Access
Question # 12

What benefits does the SAP Cloud Connector have compared to a 3rd partyreverse proxy solution, when connecting your SAP Cloud Platform with your SAP backend systems? Note: There are 2 correct answers to this question.

A.

It establishes an SSL VPN tunnel to SAP Cloud Platform

B.

It allows for remote invocation by the SAP Cloud Platform only

C.

It can cache SAP proprietary OData packets to improve the response times

D.

It supports multiple application protocols, such as HTTP and RFC

Full Access