What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note: There are 3 correct answers to this question.
A. The default values so they are appropriate for the transactions used in the roles
B. The authorization objects that are not linked to transact on codes correctly
C. The default values in the tables USOBX and USOBT
D. The default authority check settings for the role maintenance tool
E. The authorization objects that have unacceptable default values
In addition to the authorization /UI2/LAUNCHPAD, which other authorizations are required to assign to an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question.
A. /U12/INTEROP
B. /UI2JPAGE_BUILDER_CUST
C. /UI2/FLC
D. /U12JPAGE_BUILDER_PERS
You have an HR table for which you want to create a role to provide users the ability to display and change its table content based on the country groupings.
Which of the steps would you take to accomplish these requirements? Note: There are 2 correct answers to this question.
A. Maintain the authorization object S_TABU_LIN
B. Create an authorization group with appropriate authorization fields for the table
C. Define an organization criterion through transaction SPRO
D. Maintain the authorization object S_TABU_NAM
Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs.
What is the valid fi e format where data files are first converted into and then checked by a virus scanner?
A. XML
B. Plain text
C. 0csv
D. SAP compressed
The SSO authentication using X.509 client certificates is configured. Users complain that they can't log in to the back-end system. The trace file shows the following error message: "HTTP request [2/5/9] Reject untrusted forwarded certificate".
What is missing in the configuration? Note: There are 2 correct answers to this question.
A. On the back-end, the profile parameter icm/HTTPS/verify client must NOT be set to 0
B. On the web-dispatcher, the SAPSSLS.pse must be signed by a trusted certification authority
C. On the web-dispatcher, the profile parameter icm/HTTPS/verify_client must be set to 0
D. The web dispatcher's SAPSSLC.PSE certificate must be added to the trusted reverse proxies list in icm/trusted_reverse_proxy_
How can you protect a table containing sensitive data using the authorization object S_TABU_DIS?
A. The tables containing sensitive data must be associated with table groups in table TBRG.
B. The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.
C. Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables
D. The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can then be filled with *.
You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system.
Which field distribution parameter do you maintain?
A. Redistribution
B. Local
C. Global
D. Proposal
How is the role concept applied in the authorizations for Core Data Services (CDS) views?
A. CDS roles are defined in the CDS view and assigned to users in the classic role editor
B. CDS roles are defined in the WHERE clause when calling a CDS view in Open SOL
C. CDS roles are defined in the CDS view and implicitly applied to all users
D. CDS roles are mapped to the CDS view in the access rules
In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program?
A. Make sure you do NOT assign transact on A to the authorization object S_TCODE in the role that you assign to the unauthorized users.
B. Maintain SE93 with authorization objects for transact on A.
C. Maintain the check indicator in table TCDCOUPLES
D. Ensure that transact on A is NOT assigned into the same program authorization group
Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user on your SAP system which must not have a password change for 180 days. Which option would you recommend to accomplish such a request?
A. Change profile parameter login/password_expiration_time to 180
B. Create a security policy via SECPOL and assign it to tile RFC users
C. Create additional authorizations for RFC users and assign it to them
D. Create enhancement spot I user-exit
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your P_SECAUTH_21 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.