Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to identify which Authorization Objects contains which fields \ activities?

IBM, ITC Infotech,

7 12201

Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.

CTS,

2 6494

in which table we can find all authorization groups

Cognizant,

5 11188

What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code?

Deloitte,

7 35314

How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ?

Accenture,

2 10336

What is difference between BW and BI Security?

Accenture,

2 8491

How to restrict Table access in SAP?

Infosys, Wipro,

3 16787

what is meant by "Password is not downward compatible"?

Colgate,

1 10450

What does below stand for? SAP ERP ECC ABAP BASIS

Infosys,

3 11855

What are major changes happened in GRC 10 compared to that GRC 5.3?

Sony,

3 33143

what is the user table including account number and cost center in one table?

Patni,

3 8265

Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?

4 9750

how do we get list of users who are having mail-id’s in SU01 (Address tab)

4 11465

some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?

1 7364

How to codify for an Item in SAP? How many digits are required for an item?

1624


Post New SAP Security Questions






Un-Answered Questions { SAP Security }

What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3414


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

1368


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1227


As a SAP security consultant what is the most challenged you faced in previous company?

194


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

1198






I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy?

2769


Explain document transfer-level security?

165


Which tables will you use for making customizing setting for security administration?

165


Differentiate between temp role and copy role

181


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

1403


Can you explain network topology in sap systems?

137


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

1748


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

174


What does the account assessment category specify in a purchasing document in SAP Materials Management?

448


What is the maximum number of profiles in a role and maximum number of object in a role?

152