Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

2253

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

2243

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 6254

how to do Reporting and Analysis authorizations

IBM,

2471

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

2354

how to we Assigning Portal groups for Business users in BI

IBM,

1 3486

what is the difference between BI AND BW security

IBM,

2 16523

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 8137

how we Set up profile parameters and security Audit log activation

IBM,

3 8720

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

2160

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM, SAP Labs,

2342

how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter

IBM,

2 8274

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1 7182

How we Schedul and administering Background jobs.

IBM,

1 3458

How we Schedul and administering Background jobs.

IBM,

2 6929


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is the different b/w su10 and su12

2989


How to find out who has deleted users in the system?

1184


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1192


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1971


what is use of copy data in derived role and when we use this one ???

1812


List the various user types.

1072


Explain snc in sap security?

1199


what is your ticketing tool? can we give some details about how we are getting tickets

1603


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2354


Authorization check on s_btch_job failed. What would happen now?

1216


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3565


What is sap cryptographic library?

1077


when performing client copies what steps you need to take from CUA point of view?

2563


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4467


What appears as the last sentence in sap note 587410?

1059