Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What authorization is required to create and maintain user master records?

1100

How to find out who has deleted users in the system?

1162

Can you explain sap system transactions?

1135

How can you get the user list in sap?

1 2387

What is sap’s grc?

1181

What are the most used tables in sap?

1215

Which transaction code is used to manage lack entries?

1 2392

What is the difference between authorization object and authorization object class?

1125

Can you explain internet-level security?

1132

Can you explain network topology in sap systems?

1110

Can you explain transport system-level security?

1240

What is t code?

1115

What is sap internet transaction server?

1181

Can you explain protecting public keys?

1061

What is stad?

1163


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What does the item category specify in a purchasing order in SAP Materials Management?

1389


Can you explain secure store and forward?

1049


what is the critical issue u are faced in your previous experience

1935


Differentiate between usobx_c and usobt_c

1154


what is user base in sap security?

1711


What are the most used tables in sap?

1215


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2129


how you can delete multiple roles from qa, dev and production system?

1294


What are pfud t-codes used for?

1247


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2435


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1072


How do we test security systems.

1110


what is the process to find that one consultant had removed a table from sap tables

2535


what is user buffer?

1162


What profile versions?

1181