Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

2244

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

2232

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 6241

how to do Reporting and Analysis authorizations

IBM,

2456

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

2341

how to we Assigning Portal groups for Business users in BI

IBM,

1 3476

what is the difference between BI AND BW security

IBM,

2 16485

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 8117

how we Set up profile parameters and security Audit log activation

IBM,

3 8696

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

2143

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM, SAP Labs,

2336

how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter

IBM,

2 8260

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1 7166

How we Schedul and administering Background jobs.

IBM,

1 3448

How we Schedul and administering Background jobs.

IBM,

2 6904


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is the different b/w su10 and su12

2981


Can you explain document transfer-level security?

1139


Is it possible to change role template? How?

1215


How do you check background jobs?

1181


What are se09 t-codes used for?

1298


You want to remove a developer's and developer keys from a system. How would you do that?

1089


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2326


What happens to change documents when they are transported to the production system?

1819


Is it possible to have more than one st of org-level values in one role? Explain your answer.

1091


Can you explain sap system transactions?

1134


You want to create and maintain user master record. What authorization would you need?

1178


What is the difference between role and a profile?

1289


Explain transport system-level security?

1152


What are su22 t-codes used for?

1136


Which transaction should not be given to BASIS and DEV team in Production?

2509