Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 6564

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 9998

how to secure the customizing Tcodes in sap

1 7653

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 6051

1 .what are the authorization switches in security

IBM,

1 7627

use of T-code SE63

IBM, Satyam,

2 12081

why fire fighter id is using in the production system ?

IBM,

3 11832

how to modify a mass users validity,address,email...at a time ?

IBM,

3 18303

why we are using the landscape in sap r/3 ?

HP,

4 11643

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 20282

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 3799

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 15850

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 8807

What are the Critical Tcodes and Authorization Objects in R/3.

3 20523

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

2285


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1048


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1681


what is user buffer?

1161


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2285


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2336


What are the most used tables in sap?

1215


What are su22 t-codes used for?

1137


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3192


what is authorization object and authorization object class?

1260


What is the use of Personalization tab in SU01?

5677


What is a composite role?

1439


Can you explain network topology in sap systems?

1110


What is sap cryptographic library?

1063


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2336


what is your ticketing tool? can we give some details about how we are getting tickets

1600