Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1876

How many authorizations fit into a profile?

1 2162

What happens to change documents when they are transported to the production system?

1819

What is the difference between the table buffer and the user buffer?

1218

What does user compare do?

1194

What are su01d t-codes used for?

1 2138

Pfcg proposed activities but you need only two. What would you do?

1123

What are su10 t-codes used for?

1 1894

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1187

What is the use of tmssup* rfc destinations?

2608

What are se10 t-codes used for?

1133

Differentiate between derived role and composite role

1163

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1043

What are pfcg t-codes used for?

1 2105

You want to remove a developer's and developer keys from a system. How would you do that?

1094


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

how you can delete multiple roles from qa, dev and production system?

1294


what is the use of defaults tab in start menu

1889


What is the difference between c (check) and u (unmaintained)?

1876


How to assign any program to user?

1606


what is use of copy data in derived role and when we use this one ???

1793


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2145


what is your ticketing tool? can we give some details about how we are getting tickets

1600


What is the use of su56?

1137


You want to create and maintain user master record. What authorization would you need?

1178


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4259


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1065


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1072


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2285


How we schedule and administering background jobs?

1123


What authorization is required to create and maintain user master records?

1100