Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 6473

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 9772

how to secure the customizing Tcodes in sap

1 7557

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 5987

1 .what are the authorization switches in security

IBM,

1 7523

use of T-code SE63

IBM, Satyam,

2 11972

why fire fighter id is using in the production system ?

IBM,

3 11651

how to modify a mass users validity,address,email...at a time ?

IBM,

3 18124

why we are using the landscape in sap r/3 ?

HP,

4 11409

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 20143

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 3722

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 15692

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 8705

What are the Critical Tcodes and Authorization Objects in R/3.

3 20343

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

2240


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What does the item category specify in a purchasing order in SAP Materials Management?

1329


Explain sap system transactions?

1125


What does user compare do?

1158


What is the main purpose of parameters, groups & personalization tabs?

1067


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1204


Why is it important to delete sap-new profile? What steps will you take to do this?

1084


1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?

5006


Explain internet-level security?

1084


What are su22 t-codes used for?

1089


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3646


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2236


how we do CUA configuration in Quality system

2370


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2402


What is the difference between the table buffer and the user buffer?

1151


how you can delete multiple roles from qa, dev and production system?

1247