Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.

3 5922

How see hierarchies in BI security

IBM, L&T,

1 6694

What are the critical tables in BI Security

IBM, L&T,

1 13798

How to trace the Users in BI Security and give me navigation

IBM, L&T,

2 9706

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

IBM,

2444

What r the daily activity in BI security

IBM, iGate,

1 8399

What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user

IBM,

2 15128

What is purpose of using Pound Sign(#) and colon(;) in BI/BW security

IBM,

3 15021

Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that

IBM,

3 9841

Whr will u find u Generation logs in BI security and What are Generation logs will come

IBM,

2 8978

What are the T-codes in BI security

HP, IBM,

3 20208

Join SAP Security Group on Facebook for active discussions.

1 5199

Difference between User Group in "Logon data" and "Groups" tab in SU01

HP,

8 30788

What is the difference between Execution and Simulation in grc rar

IBM,

1 13437

Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?

Cognizant,

4 13608


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2448


How to assign any program to user?

1614


What are su22 t-codes used for?

1139


Tell me about derived role?

1075


How can I do a mass delete of the roles without deleting the new roles?

1456


what is use of copy data in derived role and when we use this one ???

1804


what is the main difference between the derived role and a single role?

1150


What is the main purpose of parameters, groups & personalization tabs?

1119


What is sap cryptographic library?

1069


Can you explain secure store and forward?

1054


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2444


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2248


Can you explain snc in sap security?

1169


How to find ECC system, GRC system and BI system ?

1230


Can you explain sap system transactions?

1138