Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 6580

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 10038

how to secure the customizing Tcodes in sap

1 7681

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 6063

1 .what are the authorization switches in security

IBM,

1 7638

use of T-code SE63

IBM, Satyam,

2 12108

why fire fighter id is using in the production system ?

IBM,

3 11856

how to modify a mass users validity,address,email...at a time ?

IBM,

3 18334

why we are using the landscape in sap r/3 ?

HP,

4 11681

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 20308

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 3805

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 15867

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 8817

What are the Critical Tcodes and Authorization Objects in R/3.

3 20545

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

2295


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is sap cryptographic library?

1077


What authorization are required to create and maintain user master records?

1154


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1375


Any details about secatt apart from SAPSecurity online.com?

2315


How do you check background jobs?

1193


what is the difference between usobt_c and usobx_c?

1357


How we Educated client personnel in R/3 Security and general Basis knowledge

2279


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4268


What are su53 t-codes used for?

1375


How to update risk id in rule set?

1160


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1073


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2295


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2355


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

2217


What is audit information system?

1139