Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

SAP Security Interview Questions
Questions Answers Views Company eMail

SAP GRC 10.0

1 1622

What is a niche profile in SAP ?

1 2415

How many Tcodes can be assigned to a role ?

1 2603

could anyone tell me how we can copy the mass roles from sap_all profiles???????

1101

i want to know how to list out the mass activities and mass organizational levels...

1 705

what is hypercare and go live support?

Polaris,

3605

What is difference between user master record and user buffer

IBM,

1 2004

Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request

1 823

What do you mean by ** Generated password is not downward compatible** ?

Deloitte,

1 1523

What is the use of Personalization tab in SU01?

L&T, Reliance,

2996

Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???

1 1752

what is use of copy data in derived role and when we use this one ???

818

what is user master record and what it contains?

HCL,

982

In pfcg where we can add customized t-codes. And where we can see customized t-codes

IBM,

712

1.why we use derived role in sap security?2.what is the technical difference between master and derived role?

KPMG,

1 1052


Post New SAP Security Questions






Un-Answered Questions { SAP Security }

As a SAP security consultant what is the most challenged you faced in previous company?

192


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

1549


What are the different types of sap security tables?

163


When would you update a sap table directly? What precautions would you taje?

178


what is sod in sap security?

198






when performing client copies what steps you need to take from CUA point of view?

1657


Can you explain protecting public keys?

151


What are the different types of tabs that are present in the pfcg?

150


List the various user types.

157


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1089


How to find out who has deleted users in the system?

151


Which transaction code is used to display the user buffer?

190


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1297


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

202


Mwhat is the maximum number of profiles in a role and maximum number of object in a role?

182