Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

2311

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

2293

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 6328

how to do Reporting and Analysis authorizations

IBM,

2538

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

2413

how to we Assigning Portal groups for Business users in BI

IBM,

1 3564

what is the difference between BI AND BW security

IBM,

2 16638

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 8230

how we Set up profile parameters and security Audit log activation

IBM,

3 8823

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

2203

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM, SAP Labs,

2390

how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter

IBM,

2 8380

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1 7256

How we Schedul and administering Background jobs.

IBM,

1 3535

How we Schedul and administering Background jobs.

IBM,

2 7020


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What are se10 t-codes used for?

1189


How we schedule and administering background jobs?

1200


What is the procedure for role modifications?

1249


what things you have to take care before executing run system trace?

1320


what is the different b/w su10 and su12

3032


How to codify for an Item in SAP? How many digits are required for an item?

2717


What are the most used tables in sap?

1261


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1297


what is the use of defaults tab in start menu

1960


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2491


Explain x-glueb and its use in sap security.

1417


could anyone tell me how we can copy the mass roles from sap_all profiles???????

2194


Differentiate between temp role and copy role

1257


When would you update a sap table directly?

1127


How do we test security systems.

1157