Month End Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

SAP C_SEC_2405 SAP Certified Associate - Security Administrator Exam Practice Test

Page: 1 / 8
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Question 1

What must you do before you can use transaction PFCG? Note: There are 2correct answers to this question.

Options:

A.

Fill tables USOBT and USOBX with the SAP-delivered authorization default values.

B.

Set the system profile parameter auth/no_check_in_some_cases to Y.

C.

Fill tables USOBT_C and USOBX_C with the SAP-delivered authorization default values.

D.

Set the system profile parameter auth/no_check_in_some_cases to N.

Question 2

Which limitations apply to restricted users in SAP HANA Cloud? Note: There are 3correct answers to this question.

Options:

A.

They can only create objects in their own database schema.

B.

They can only connect to the database using HTTP/HTTPS.

C.

They only have full SQL access via the SQL console.

D.

They cannot connect via ODBC or JDBC.

E.

They cannot create objects in the database.

Question 3

Which user types can log on to the SAP S/4HANA system in interactive mode? Note: There are 2correct answers to this question.

Options:

A.

Dialog User

B.

Service User

C.

System User

D.

Communication User

Question 4

In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2correct answers to this question.

Options:

A.

Global Account

B.

Organization

C.

Subaccount

D.

Directory

Question 5

How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3correct answers to this question.

Options:

A.

By helping customers to start exploring SAP Fiori in SAP S/4HANA on premises as quickly as possible.

B.

By supporting content activation at the business role level, including SAP Fiori apps and all associated Web Dynpro for ABAP applications.

C.

By allowing customers to select individual SAP Fiori apps for their end-to-end business processes.

D.

By allowing customers to select and activate SAP Fiori apps one by one, independent of dependencies needed for app-to-app navigation.

E.

By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.

Question 6

In SAP S/4HANA Cloud Public Edition, what does the ID of an SAP-predefined Space refer to?

Options:

A.

The business roles it is to be assigned to

B.

The business area it was designed for

C.

The software release it was created for

D.

The SAP Fiori applications it was defined for

Question 7

Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2correct answers to this question.

Options:

A.

S_ESH_CONN

B.

SDDLVIEW

C.

S_ESH_ADM

D.

RSDDLTIP

Question 8

What must you do if you want to enforce an additional authorization check when a user starts an SAP transaction?

Options:

A.

Assign authorization object S_START to the chosen transaction code with transaction SU24 and specify the Program ID and Object Type.

B.

Assign the authorization object to be checked to the chosen transaction code in the SAP Default authorization data using transaction SU22 and set Check Indicator to "Check".

C.

Assign the authorization object to be checked to the chosen transaction code with transaction SU24 and set Default Status to "Yes".

D.

Assign the authorization object and permissions to the chosen transaction code using transaction SE93.

Question 9

Where can you find information on the SAP-delivered default authorization object and value assignments? Note: There are 2correct answers to this question.

Options:

A.

USOBT_C

B.

USOBT

C.

SU22

D.

SU24

Question 10

SAP BTP distinguishes between which of the following users? Note: There are 2correct answers to this question.

Options:

A.

Business users

B.

Technical users

C.

Platform users

D.

Key users

Question 11

In SAP HANA Cloud, who has access to a database object?

Options:

A.

The user DBADMIN and the group owner

B.

The user SYSTEM and the creator

C.

The owner and the SAP-owned users

D.

The creator and the schema owner

Question 12

Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?

Options:

A.

SAP EarlyWatch Alert

B.

SAP Enterprise Threat Detection

C.

SAP Code Vulnerability Analyzer

D.

SAP Security Optimization Services

Question 13

What is the correct configuration setting in table PRGN_CUST for user assignments when transporting roles within a Central User Administration scenario?

Options:

A.

SET_IMP_LOCK_USERS = YES

B.

SET_IMP_LOCK_USERS = NOO

C.

USER_REL_IMPORT = YES

D.

USER_REL_IMPORT = NO

Question 14

Which of the following are SAP Fiori Launchpad functionalities? Note: There are 2correct answers to this question.

Options:

A.

Spaces

B.

SAP GUI

C.

Web Dynpro

D.

User Actions Menu

Question 15

Which SAP Fiori deployment option requires the Cloud connector?

Options:

A.

SAP Fiori for SAP S/4HANA standalone front-end server

B.

SAP S/4HANA embedded

C.

SAP Business Technology Platform

D.

SAP S/4HANA Cloud Public Edition

Question 16

When creating PFCG roles for SAP Fiori access, what is included automatically when adding a catalog to the menu of a back-end PFCG role? Note: There are 2correct answers to this question.

Options:

A.

The start authorizations and the authorization default values for each IWSG TADIR service definitions in the catalog.

B.

The start authorizations and the authorization default values for each IWSV TADIR service definitions in the catalog.

C.

The IWSG TADIR service definitions from the catalog.

D.

The IWSV TADIR service definitions from the catalog.

Question 17

In the administration console of the Cloud Identity Services, which system property types can you add? Note: There are 2correct answers to this question.

Options:

A.

Standard

B.

Internal

C.

Credential

D.

Default

Question 18

In the administration console of the Cloud Identity Services, for which system type can you define both read and write transformations?

Options:

A.

Source systems

B.

Target systems

C.

Proxy systems

Question 19

Which of the following are Security Goals? Note: There are 2correct answers to this question.

Options:

A.

Repudiation

B.

Identity Authentication

C.

Encryption

D.

Information Integrity

Question 20

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

Options:

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Question 21

Which functions in SAP Access Control can be used to approve or reject a user's continued access to specific security roles? Note: There are 2correct answers to this question.

Options:

A.

User Access Review

B.

Role Certification

C.

SOD Review

D.

Role Reaffirm

Question 22

Which of the following services does the Identity Authentication Service provide? Note: There are 2correct answers to this question.

Options:

A.

Authentication

B.

Single Sign-On

C.

Central User Repository

D.

Policy refinement

Question 23

For which of the following can transformation variables be used?

Options:

A.

To save data to the output JSON file

B.

To save data permanently

C.

To save data temporarily

Question 24

What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3correct answers to this question.

Options:

A.

It is prioritized.

B.

It is pseudonymized.

C.

It is categorized.

D.

It is normalized.

E.

It is enriched.

Page: 1 / 8
Total 80 questions