if user enters a tcode how the system knows what action should be done ?
Answer Posted / anusha
this question is asked in Deloitte, but i explained about how the t-code works and all, but he said no, can any one tell me the correct answer.
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
what is the process to find that one consultant had removed a table from sap tables
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is the use of defaults tab in start menu
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
User is not there in User master record. Then how to trace the user?
Pfcg proposed activities but you need only two. What would you do?
Can you explain secure store and forward?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What happens to change documents when they are transported to the production system?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what is the difference between usobt_c and usobx_c?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What are the upgrades happened in GRC 5.3 from GRC 5.2?