SAP Security Interview Questions
Questions Answers Views Company eMail

SAP GRC 10.0

1 2547

What is a niche profile in SAP ?

2 3495

How many Tcodes can be assigned to a role ?

1 4004

could anyone tell me how we can copy the mass roles from sap_all profiles???????

1599

i want to know how to list out the mass activities and mass organizational levels...

1 1661

what is hypercare and go live support?

Polaris,

4713

What is difference between user master record and user buffer

IBM,

1 3269

Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request

1 2152

What do you mean by ** Generated password is not downward compatible** ?

Deloitte,

2 4765

What is the use of Personalization tab in SU01?

L&T, Reliance,

4988

Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???

1 2797

what is use of copy data in derived role and when we use this one ???

1320

what is user master record and what it contains?

HCL,

1 2166

In pfcg where we can add customized t-codes. And where we can see customized t-codes

IBM,

1220

1.why we use derived role in sap security?2.what is the technical difference between master and derived role?

KPMG,

1 2241


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

could anyone tell me how we can copy the mass roles from sap_all profiles???????

1599


What is sap internet transaction server?

694


What is the difference between authorization object and authorization object class?

641


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1559


Can you explain internet-level security?

641






the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1632


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3740


Explain network topology in sap systems?

599


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

666


How we schedule and administering background jobs?

655


Can you explain network topology in sap systems?

617


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1673


Which transaction should not be given to BASIS and DEV team in Production?

1900


What profile versions?

791


What are se09 t-codes used for?

687