Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.

2 5733

1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?

IBM,

3 24109

Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur

10 17185

how many composite roles can be assigned to a user ?

ADP, Baidu,

4 15996

What is the difference between ECC security and RAR security when GRC (RAR

ADP, Baidu,

2 11520

What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?

IBM,

4 11609

What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?

Wipro,

3 11839

Whay can't you assign a composite role to another composite role ? Need clear explaintion.

Wipro,

3 19473

What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Wipro,

13 29823

How can you find all t-codes which are locked in the system ?

Wipro,

5 15382

how to lock the client?

IBM,

3 12306

how to delete a single role,the single role is existing with 10 users

4 12009

How to access sap security throw internet?

2 7160

in how many roles a T-code exists? Find it without se16 or suim

IBM,

10 29928

I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?

1 8183


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Explain sap system transactions?

1177


Pfcg proposed activities but you need only two. What would you do?

1125


1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?

5055


List the various user types.

1065


How to do Role Design, Testing and Implementation

2513


Can you explain internet-level security?

1132


What is the procedure for role modifications?

1190


Which transaction code is used to display the user buffer?

1194


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2163


Can you explain document transfer-level security?

1148


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1479


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4459


What is the main purpose of parameters, groups & personalization tabs?

1119


What are some ap security t codes?

1164


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2236