Answer Posted / ravi
GRC DEV and GRC Production
| Is This Answer Correct ? | 4 Yes | 3 No |
Post New Answer View All Answers
Explain protecting public keys?
What is use of derived roles?
What is the difference between the table buffer and the user buffer?
What are su53 t-codes used for?
Can you explain document transfer-level security?
how we can see FFID if firefighter not able to see FFids ?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
what is your ticketing tool? can we give some details about how we are getting tickets
What is the maximum number of profiles in a role and maximum number of object in a role?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What is sap internet transaction server?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what things you have to take care before executing run system trace?