SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1094

How many authorizations fit into a profile?

1 1459

What happens to change documents when they are transported to the production system?

1175

What is the difference between the table buffer and the user buffer?

736

What does user compare do?

688

What are su01d t-codes used for?

1 1201

Pfcg proposed activities but you need only two. What would you do?

668

What are su10 t-codes used for?

1 1140

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

707

What is the use of tmssup* rfc destinations?

1732

What are se10 t-codes used for?

702

Differentiate between derived role and composite role

656

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

630

What are pfcg t-codes used for?

1 1383

You want to remove a developer's and developer keys from a system. How would you do that?

634


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

how a t code works

1974


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4142


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2218


Can you explain internet-level security?

651


What is stad?

735






How can sap security be improved?

686


What does the item category specify in a purchasing requisition in SAP Materials Management?

1086


You want to remove a developer's and developer keys from a system. How would you do that?

634


What is the difference between usobx_c and usobt_c?

644


How to run the daily background job s for virsa violations ? thabks in advance

3158


What is use of derived roles?

762


What is sap’s grc?

725


Can wildcards be used in authorizations?

702


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3241


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

630