SAP Security Interview Questions
Questions Answers Views Company eMail

How can we Lock transaction ? What happens exactly ?

Patni,

4 10621

How many Single roles can be added in one Composite role ?

Patni,

3 23725

What is use of System Task Tab on menubar in PFCG ?

IBM, Patni,

2 9076

What is mean By Start Profile, Default Profile, Instance Profile ? What is difference between these ?

Patni,

4 20256

what is difference between se16 and sm31?

1 7705

What are identical users in CUA?

2 6901

What are the authorization objects which are always present in user master record?

Wipro,

1 10488

how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2006

what is difference between se16N and sm31?

Patni,

2 10084

SAP R/3, BI, HR, EP Security, GRC AC 5.3, XI/PI Administration www.learnbasis.com

IBM,

1 10712

what is CUA ? wat are the steps required to configure it ? and then hou does it work ?

IBM,

2 5823

what are the service market place activities from authorizations point of view ?

IBM,

1 5166

i am asked to get through at "Authorizations analysis and correct assignments" wat does it mean and wat all concepts comes under these ?

IBM,

3 6494

what are all the questions covered in "profiles related concepts " please let me know ?

IBM,

1626

a user is not able to execute a t-code ; hou do u solve that ? wat are the difft reasons that might be existing ?

IBM,

2 16857


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is a composite role?

801


What does the pfcg_time_dependency clean up?

796


Differentiate between usobx_c and usobt_c

622


What is audit information system?

710


How to run the daily background job s for virsa violations ? thabks in advance

3153






Can you explain sap system transactions?

684


How to create users?

718


What is sap cryptographic library?

627


Differentiate between derived role and composite role

650


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1674


What is stad?

726


Explain protecting public keys?

665


What does the account assessment category specify in a purchasing document in SAP Materials Management?

922


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1765


what is user buffer?

718