Category Archives: SAP Security MCQs

What are the best practices for establishing a connection type Establishing Trust for Server-Sideauthentication? | SAP Security Mcqs

A. Generate the key pair on the server component. B. Use a public-key certificate that is signed and issued by a CA C. Make sure the client components trust the issuing CA. D. It is necessary for the server to … Continue reading

Posted in SAP Security MCQs | Leave a comment

The User Management Engine (UME) allows you to define a security policy, with reference to this, which of the following statements are true? | SAP Security Mcqs

A. The number of failed logon attempts after which a user is locked, is defined in the security policy. B. The UME security policy is independent of the security policy of the UME data source C. You can define a … Continue reading

Posted in SAP Security MCQs | Leave a comment

The LDAP Connector is called using ABAP functions and communicates with the directory server using the Lightweight Directory Access Protocol (LDAP). The connection with the directory server can be created with various analysis methods, such as simple binding or anonymously. The above statement is: | SAP Security Mcqs

A. True B. False Ans: A

Posted in SAP Security MCQs | Leave a comment

You have a mixed system landscape including both SAP and non-SAP systems, or you have an existing corporate LDAP directory in your system landscape. User management data is stored in a combination of an LDAP server and a database. Which of the following data is written to and read from the IDAP server? | SAP Security Mcqs

A. Additional data (for example, information about when a user was last changed) B. Other principal types (for example, roles) C. Groups (displayname, description, uniquename, and the group members) D. User accounts (logonid, password, ID of the assigned user) Ans: … Continue reading

Posted in SAP Security MCQs | Leave a comment

With reference to the LDAP directory, and the UME, which of the following are true? | SAP Security Mcqs

A. The LDAP directory can either be connected as a read-only data source or as a writeable data source B. The UME can support Users as a tree or a Flat hierarchy C. The Distinguished Names (DNs) of user and … Continue reading

Posted in SAP Security MCQs | Leave a comment

The As ABAP communicates with its communication partners using various protocols. Each of these protocols use a specific security mechanism. which of the following protocols are matched up correctly with the security mechanism? | SAP Security Mcqs

A. DIAG’–SSL B. RFC–SSLS C. HUP–SNCS D. LDAP – SSL Ans: D

Posted in SAP Security MCQs | Leave a comment

Security Java security roles on the AS Java can be defined either globally or locally. Which of the following are globally defined security roles in AS Java? | SAP Security Mcqs

A. Guest B. All C. System D. KeystoreViewCreator Ans: D

Posted in SAP Security MCQs | Leave a comment

The AS ABAP categorizes users into several types for different purposes. Which of the following are NOT valid user types in AS ABAP. | SAP Security Mcqs

A. Service B. Reference C. Guest D. System Ans: C

Posted in SAP Security MCQs | Leave a comment

A role contains several profiles. Which of the following tables can fetch that list? | SAP Security Mcqs

A. agr_prof B. agr_1016 C. agr_1250 D. agr_define Ans: B

Posted in SAP Security MCQs | Leave a comment

The user buffer can be displayed using transaction code: | SAP Security Mcqs

A. AL11 B. SU56 C. AL08 D. SU53 Ans: B

Posted in SAP Security MCQs | Leave a comment