Which cryptographic libraries are provided by SAP? Note: There are 2correct answers to this question.
Your developer has created a new custom transaction for your SAP S/4HANA on-premise system and has provided you a list of the authorizations needed to execute the new ABAP program."What must you do to ensure that each required authorization is automatically created every time this new custom transaction is added to a PFCG role?
Which solution is NOT used to identify security recommendations for the SAP Security Baseline?
What must you do before you can use transaction PFCG? Note: There are 2correct answers to this question.
What is required to centrally administer a user's master record using Central User Administration? Note: There are 3correct answers to this question.
Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2correct answers to this question.