Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.

2 5633

1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?

IBM,

3 23904

Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur

10 16877

how many composite roles can be assigned to a user ?

ADP, Baidu,

4 15815

What is the difference between ECC security and RAR security when GRC (RAR

ADP, Baidu,

2 11416

What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?

IBM,

4 11467

What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?

Wipro,

3 11712

Whay can't you assign a composite role to another composite role ? Need clear explaintion.

Wipro,

3 19309

What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Wipro,

13 29350

How can you find all t-codes which are locked in the system ?

Wipro,

5 15194

how to lock the client?

IBM,

3 12140

how to delete a single role,the single role is existing with 10 users

4 11842

How to access sap security throw internet?

2 7065

in how many roles a T-code exists? Find it without se16 or suim

IBM,

10 29604

I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?

1 8069


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7093


Can you explain snc in sap security?

1096


Can you explain protecting public keys?

1021


What does the item category specify in a purchasing requisition in SAP Materials Management?

1477


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2675


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1014


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2314


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1038


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2437


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1005


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1934


what is your ticketing tool? can we give some details about how we are getting tickets

1565


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2254


What are su22 t-codes used for?

1100


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2294