Answer Posted / roshy
Yes
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
A user moved the transport request from dev to qua. How would you trace him?
what can we do if shadow instance is down and getting up in prepare phase of upgrade
How you will do that?
Hi All I am Vamshi I Provide Training on ECC Security, Bi Security, HR Security, GRC Access Control Suit(RAR SPM CUP ERM), SRM Security and CRM Security. Duration: 30 days Fees: Rs 7000/- Vamshi Krishna +91-7569362152 email: s.sap30@gmail.com
How to analysis abap dumps?
How to define logon groups?
At o.s level where to check for system logs of sap application?
How to configure TMS?
What is upgrade process? And how u will do that?
list some common errors faced with jspm while updating java stcks.and solutions.
Transport request types and its syntax?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?
What is sap single stack system?
How you can restrict multiple logins of user in sap? What are the thing you have to take care of while writing the id’s?
How to perform the transport?