how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
2341how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
2132How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
2248how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
2343Post New IBM SAP Security Interview Questions
What does nodeagent do in websphere application server?
what is the way for creating organization in OM.
Explain the purpose of gui map configuration?
What is icai?
What is the vertical line character called?
Where can you evaluate the wage types?
Discuss about Baluchar Buttedar.
What are the types of layout in android?
Can you explain the role of an ophthalmologist and the scope of their practice within the field of medicine?
What are the new features added to JDBC 4.0?
Explain what are snapshots? What are materialized views & where do we use them? What is a materialized view log?
What are the tools to install java patches?
1. How would you Test & then automate an antivirus application? 2. How would u test & automate windows screen saver? (expected: "test scenarios" & "test approch": points)
How many types of database languages are?
How can we turn off csrf protection for a particular route?