Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following C_SECAUTH_20 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C_SECAUTH_20 Exam Dumps - SAP Certified Technology Associate - SAP System Security and Authorizations

Question # 4

Which CDS- related repository object types are provided with ABAP CDS? Note: There are 3 correct answer to this question.

A.

SQL View

B.

Data Definition

C.

Metadata Extensions

D.

CDS View Entity

E.

Access Control

Full Access
Question # 5

What content can be shared between SAP Access Control and SAP Cloud Identity and Access Governance products? Note: There are 3 correct answer to this question.

A.

Mitigations

B.

Process Hirarchy

C.

Mitigation Control

D.

Risk Library

E.

Emergency Access

Full Access
Question # 6

You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should your adjustments be recorded?

A.

USOBX_C

B.

USOBT_C

C.

USOBHASH

D.

USOBX

Full Access
Question # 7

In the case of missing OData authorizations, why is it not recommended to maintained S_SERVICE manually within an SAP Fiori Authorization Role?

Note: There are 2 correct answer to this question.

A.

The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an OData service

B.

The SRV_NAME Value of the S_SERVICE authorization object is the name of an OData service

C.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values

D.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with same authorization values

Full Access
Question # 8

How can you protect a system when you do not want the user assignments for a role to be transported?

A.

Restrict access to the user assignment tab in PFCG in the target system

B.

Restrict import of users in table PRGN_CUST in the target system

C.

Restrict import of users in table PRGN_CUST in the development system

D.

Restrict access to the user assignment tab in PFCG in the Development system

Full Access
Question # 9

Which of the following parameter must be configured to capture log data in the Security Audit log?

A.

rec/client

B.

rsau/enable

C.

rdisp/TRACE

D.

dirjogging

Full Access
Question # 10

Which of the following are prerequisites for using transaction PFCG? Note: There are 2 correct answer to this question.

A.

Fill Initial values for customer tables using transaction SU25

B.

Maintain parameter auth/no_check_in_some_cases = Y

C.

Generate Standard Role SAP_NEW using transaction SU25

D.

Maintain the Check Indicators for Critical Authorization objects

Full Access
Question # 11

Which ABAP transaction codes are relevant for SNC parameter configuration? Note: There are 2 correct answer to this question.

A.

SNCWIZARD

B.

STRUST

C.

SNCCONFIG

D.

SNCO

Full Access
Question # 12

Which TADIR Service Object type includes business functional authorization objects used within the OData execution?

A.

IWSG

B.

IWSC

C.

OSOD

D.

IWSV

Full Access