Answer Posted / karthik_sesha333
To change the short description of the role
Is This Answer Correct ? | 11 Yes | 6 No |
Post New Answer View All Answers
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is Sap security t-codes?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
what is centralize FFID?
Explain protecting public keys?
How do you check background jobs?
Differentiate between derived role and composite role
Which t-code can be used to delete old security audit logs?
What authorization are required to create and maintain user master records?
What is the difference between c (check) and u (unmaintained)?
what is your ticketing tool? can we give some details about how we are getting tickets
what is the difference between usobt_c and usobx_c?
When would you update a sap table directly?
How to do Role Design, Testing and Implementation