| Other SAP Security Interview Questions |
|| Asked @
|In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
|Can we delete a Role and transport it?Explain How?
|In which table you can see authorization group for table and
which table to see authorization group for program?
|what is the rule set in GRC?
|what is use of su56?
Currently i am working in an MNC company as an SAP
Security tier1 member , we will take care of User
Administration , Profile/authorization administration
activities .Could any one tell me , is i am eligible to
apply for an SAP Security job for 2 years experience .
Could any one tell me about SOD , SOX Audit and Virsa tool ,
i have never worked before .
|. Is it possible to have a request type by which we can change
the validity period of a user? If possible, then what are the
|How can assign miising authorizations in BI?
|how v Check SOD conflicts through VRAT
|How to assign sap_all to end user if i have approval?remember
i do not have GRC.
|Difference between short and Long Description in PFCG?
|Whay can't you assign a composite role to another composite
role ? Need clear explaintion.
|For more SAP Security Interview Questions Click Here |