Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1889

How many authorizations fit into a profile?

1 2177

What happens to change documents when they are transported to the production system?

1832

What is the difference between the table buffer and the user buffer?

1235

What does user compare do?

1210

What are su01d t-codes used for?

1 2158

Pfcg proposed activities but you need only two. What would you do?

1128

What are su10 t-codes used for?

1 1919

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1192

What is the use of tmssup* rfc destinations?

2615

What are se10 t-codes used for?

1142

Differentiate between derived role and composite role

1173

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1060

What are pfcg t-codes used for?

1 2112

You want to remove a developer's and developer keys from a system. How would you do that?

1105


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1052


When would you update a sap table directly?

1088


Authorization check on s_btch_job failed. What would happen now?

1216


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2493


Explain protecting public keys?

1277


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2667


Can you explain network topology in sap systems?

1117


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2814


Can you explain transport system-level security?

1247


What happens to change documents when they are transported to the production system?

1832


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4467


What is sap’s grc?

1189


How to insert missing authorization?

1148


Explain snc in sap security?

1199


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1256