Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

IBM SAP Security Interview Questions
Questions Answers Views Company eMail

What are the critical tables in BI Security

1 11038

How to trace the Users in BI Security and give me navigation

2 7348

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

1698

What r the daily activity in BI security

1 5996

What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user

2 11976





What is purpose of using Pound Sign(#) and colon(;) in BI/BW security

3 12380

Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that

3 6790

Whr will u find u Generation logs in BI security and What are Generation logs will come

2 6787

What are the T-codes in BI security

3 16957

What is the difference between Execution and Simulation in grc rar

1 11070

1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?

3 18125

What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?

4 8288

how to lock the client?

3 9564

in how many roles a T-code exists? Find it without se16 or suim

10 20312

How to identify which Authorization Objects contains which fields \ activities?

7 12728

Post New IBM SAP Security Interview Questions




IBM SAP Security Interview Questions


Un-Answered Questions

IS IT POSSIBLE TO RUN GL IMPORT PROGRAM BY USING API FND_REQUSET.SUBMIT_REQUEST IF IT IS THEN PLZ MENTION THE C.P NAME

1521


How do you log in to a remote Unix box using ssh?

80


What is Discover and Execute in XMLA?

1454


From a strategic perspective, how can senior management make the best use of the human resource function?

1177


How to setup password less remote login/ssh?

241






What does a lock object involve?

306


What are the main requirements for caching?

217


I have created mobile site but donot have real devices so should i check though Emulators like mobiletest.me etc ?

752


What is solution in solution manager administration work center?

1


What are the major advantages of Scala Language? Are there any drawbacks of Scala Language?

3


What are Arrays in flex?

1


What are java methods?

216


What is the rdbms concept in sql?

193


Which performance measurement tells us what the projected total cost of the project will be at completion? A. ETC B. CPI C. SPI D. EAC

280


What happens if the distributed cache is stopped?

186