Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16382Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
2 14251Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
2 9123Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
3 8611In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
4 15881Post New HP SAP Security Interview Questions
What is Edge finding?
what is the difference between active power and reactive power and apparant power in practical as well as theoritical
Name a fungus that is gram positive?
What does umask 022 mean?
What are the causes that the price of the share goes up and down in daily transaction?
What is the use of ‘debugger’ keyword in javascript code?
Is hibernate sessionfactory is thread safe?
A coil of wire that produces a magnetic field is typically called a
When do you suggest to use shopping cart?
What is the use of Organization structure in SAP SRM?
What is aws and how does it work?
What is the purpose of designing amazon swf?
What is keyword and identifier?
What do you mean by Persistence?
What does int main () mean?