SAP Security Interview Questions
Questions Answers Views Company eMail

Explain internet-level security?

631

Explain snc in sap security?

697

Explain secure store and forward?

617

Explain protecting public keys?

668

Explain composite role?

1 2111

Explain transport system-level security?

642

Explain network topology in sap systems?

602

How to know the total no. of users in particular plant in sap?

1 1213

How to approach as a security consultant when a custom t code is created?

1 1111

What are the uses of an authorization group?

708

In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

537

the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1634


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is sod in sap security?

728


What is the main purpose of parameters, groups & personalization tabs?

638


Differentiate between derived role and composite role

652


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1783


What is use of derived roles?

752






How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

892


What is sap’s grc?

714


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2124


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1694


What is Sap security t-codes?

713


Differentiate between temp role and copy role

692


How to do Role Design, Testing and Implementation

2035


Why is it important to delete sap-new profile? What steps will you take to do this?

669


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1634


Can you explain snc in sap security?

640