SAP Security Interview Questions
Questions Answers Views Company eMail

What are pfud t-codes used for?

669

You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

574

Which tables will you use for making customizing setting for security administration?

676

When would you update a sap table directly? What precautions would you taje?

687

Is it possible to have more than one st of org-level values in one role? Explain your answer.

629

When would you update a sap table directly?

630

Differentiate between usobx_c and usobt_c

603

What are su22 t-codes used for?

665

You want to create and maintain user master record. What authorization would you need?

697

What appears as the last sentence in sap note 587410?

635

List the various user types.

598

What are su53 t-codes used for?

794

Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

651

Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

801

As a SAP security consultant what is the most challenged you faced in previous company?

649


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is sod in sap security?

709


Which transaction code is used to display the user buffer?

643


Which transaction should not be given to BASIS and DEV team in Production?

1864


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

574


what is the use of defaults tab in start menu

1363






The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

1982


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

678


what is use of copy data in derived role and when we use this one ???

1285


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1762


What does the pfcg_time_dependency clean up?

774


Can you explain transport system-level security?

568


How do we test security systems.

626


What is the main purpose of parameters, groups & personalization tabs?

623


what is hypercare and go live support?

4682


What are the upgrades happened in GRC 5.3 from GRC 5.2?

3688