Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


1) Explain me about your SAP Career?
2) Tell me your daily monitoring jobs and most of them you
worked on?
3) which version of SAP are you working on? Is it a java
stack or abap stack?
4) Tell me about derived role?
5) what is the main difference between single role and a
derived role
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
7) Tell me the steps to configure CUA?
8) Is RAR a java stack or Abap Stack?
9) What is the report which states the critical T-codes? and
also What is the T-code?
10) What is the T-code to get into RAR from R/3?
11) Explain about SPM?

Answer Posted / sudha

4) Tell me about derived role?
Ans:Derived roles..To restrict the user access based on
organizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
5) what is the main difference between single role and a
derived role?
Ans:Main difference--we can add/delete the tcodes for the
single roles but we cann't do it for the derived roles.
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
Ans:If we do the adjusted derived role in the master role
while updating the values in the master role thn values will
be reflected in the child roles.
10) What is the T-code to get into RAR from R/3?
Ans:/virsar/ZVRAT
11: Explain about SPM?
Ans:SPM can be used to maintain and monitor the super user
access in an SAP system. This enables the super-users to
perform emergency activities and critical transactions
within a completely auditable environment. The logs of the
SPM user IDs helps auditors in easily tracing the critical
transactions that have been performed by the Business users

Is This Answer Correct ?    11 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2132


What does user compare do?

1201


What are su53 t-codes used for?

1369


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2647


what is the different b/w su10 and su12

2987


how we do CUA configuration in Quality system

2436


What is the use of su56?

1139


what are all the questions covered in "profiles related concepts " please let me know ?

2118


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7174


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2329


what is the critical issue u are faced in your previous experience

1936


Can you explain sap system transactions?

1138


What is stad?

1169


What are su25 t-codes used for?

1249


When would you update a sap table directly? What precautions would you taje?

1215