What is the SAP Best Practice to delete a security SAP role in SAP landscape?
A. Transport the SAP role and delete the role using Profile Generator
B. Delete the SAP role in all clients using Profile Generator
C. Delete the SAP role using Profile Generator, and then put it in the transport
D. Delete the SAP role in all clients in all systems using Profile Generator
What is required when you configure the PFCG role for an end-user on the front-end server? Note: There are 2 correct answers to this question.
A. The catalog assignment for the start authorization
B. The S_RFC authorization object for the OData access
C. The Fiori Launchpad designer assignment
D. The group assignment to display it in the Fiori Launchpad
What is the User Management Engine (UME) property "connect on pooling" used for? Note: There are 2 correct answers to this question.
A. To improve performance of requests to the LDAP directory server
B. To avoid unauthorized request to the LDAP directory server
C. To create a new connect on to the LDAP directory server for each request
D. To share server resources among requesting LDAP clients
You are evaluating the "Cross-client object change" option using transact on SCC4 for your Unit Test Client in the development environment.
Which setting do you recommend?
A. Changes to repository and cross-client customizing allowed
B. No changes to repository and cross-client customizing objects
C. No changes to cross-client customizing objects
D. No changes to repository objects
What authorization objects do we need to create job steps with external commands in a background job? Note: There are 2 correct answers to this question.
A. S_ADMI_FCD
B. S_LOG_COM
C. S_RZL_ADM
D. S_BTCH_EXT
How would you control access to the ABAP RFC function modules? Note: There are 2 correct answers to this question.
A. O Block RFC Callback Whitelists
B. O Restrict RFC authorizations
C. O Deactivate switchable authorization checks
D. O Implement UCON functionality
What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.
A. Synchronization of user contexts from ABAP Systems
B. Predictive threat notification
C. Pseudonymize user identities for data protection
D. Baseline detection
You are running a 3-tier SAP system landscape. Each time you are accessing STMS_IMPORT on any of these systems, you are prompted for a TMSADM password. How can you stop this prompt from appearing?
A. Run the report RSUSR405 on the domain controller.
B. Reset the TMSADM user's password on the system you are trying to access STMS_ IMPORT.
C. Change the TMSA DM user's password directly in the TMS RFC destination in transact on SM59.
D. Run the report TMS_ UPDATE_PWD_OF_TMSADM on the domain controller.
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?
A. S_PROGRAM
B. S_START
C. S_TCODE
D. S_SERVICE
Which of the following events will create security alerts in the CCMS Alert Monitor of SAP Solution Manager? Note: There are 2 correct answers to this question.
A. Manual table changes
B. Changes to the instance profile
C. Call of RFC functions
D. Start of reports
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your P_SECAUTH_21 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.