What are the main features of SAP Enterprise Threat Detection (ETD)? Note: There are 3 correct answer to this question.
Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?
What is the purpose of securing sensitive business data? Note: There are 3 correct answer to this question.
Which configuration options apply to the usage of VCLIENT in the parameter icm /server_port_
In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data?
Note: There are 3 correct answer to this question.
Which of the following actions are required to ensure complete logging of table data changes? Note: There are 3 correct answer to this question.
You want to turn off the SAP menu on Easy Access Menu Screen. What administrative function do you need in Authorization Object S_USER_ADM ?
Which of the following table contains transport request object list and table entry keys? Note: There are 2 correct answer to this question.
Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?
Which of the following accurately describe Solution Manager Functionality? Note: There are 3 correct answer to this question.
Which transaction code allows you to configure the SAP System Audit Log?
Which transaction codes are relevant to enable SNC between ABAP system? Note: There are 3 correct answer to this question.