Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SU24 must be set up before implementing any roles.
A. True
B. False

Answer Posted / karunakar

It is False
with SU24 we can find the relationship between Tcode and
auth objects,
Please correct me if i am wrong

Is This Answer Correct ?    3 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4713


Explain snc in sap security?

1191


As a SAP security consultant what is the most challenged you faced in previous company?

1101


what things you have to take care before executing run system trace?

1250


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2236


What are su25 t-codes used for?

1249


What happens to change documents when they are transported to the production system?

1831


List the various user types.

1065


Can you explain sap system transactions?

1138


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2157


What are se10 t-codes used for?

1136


What is sap cryptographic library?

1069


What are the most used tables in sap?

1218


Can you explain protecting public keys?

1066


Which tables will you use for making customizing setting for security administration?

1159