Answer Posted / itsgaurav151
For translation of initial screen
| Is This Answer Correct ? | 11 Yes | 2 No |
Post New Answer View All Answers
Pfcg proposed activities but you need only two. What would you do?
Differentiate between derived role and composite role
Can you explain secure store and forward?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Explain protecting public keys?
What are pfud t-codes used for?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How do we test security systems.
what are all the questions covered in "profiles related concepts " please let me know ?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What profile versions?
What is the main purpose of parameters, groups & personalization tabs?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE