Month End Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

SAP C_SEC_2405 Dumps

Page: 1 / 8
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Question 1

What use cases are available for a Local Identity Directory? Note: There are 3correct answers to this question.

Options:

A.

Hybrid mode

B.

Merging attributes

C.

S/4HANA use case

D.

Proxy mode

E.

Classic use case

Question 2

For which of the following can transformation variables be used?

Options:

A.

To save data to the output JSON file

B.

To save data permanently

C.

To save data temporarily

Question 3

Which user type in SAP S/4HANA Cloud Public Edition is used for API access, system integration, and scenarios where automated data exchange is required?

Options:

A.

SAP Communication User

B.

SAP Technical User

C.

SAP Administrative User

D.

SAP Support User

Question 4

You are evaluating startable applications. Which of the following can you use to check if there is an application start lock on an application contained in a PFCG role? Note: There are 2correct answers to this question.

Options:

A.

Transaction SUIM-Executable Transactions report

B.

Transaction SM01_DEV

C.

Transaction SM01_CUS

D.

Transaction SUIM - Transactions Executable with Profile report

Question 5

When planning an authorization concept for your SAP S/4HANA Cloud Public Edition implementation, what rules must you consider? Note: There are 2correct answers to this question.

Options:

A.

SAP Fiori apps, dashboards, and displays can be assigned directly to a business role.

B.

Business catalogs can be assigned directly to a business user.

C.

Business roles can be assigned directly to a business user.

D.

Business catalogs can be assigned directly to a business role.

Question 6

What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3correct answers to this question.

Options:

A.

Store keys

B.

Conceal keys

C.

Rotate keys

D.

Generate keys

E.

Transmit keys

Question 7

Which privilege types are available in SAP HANA Cloud? Note: There are 3correct answers to this question.

Options:

A.

Application

B.

Package

C.

System

D.

Analytic

E.

Object

Question 8

What are some security safeguards categories? Note: There are 3correct answers to this question.

Options:

A.

Physical

B.

Access Control

C.

Organizational

D.

Technical

E.

Financial

Question 9

In SAP S/4HANA Cloud Public Edition, what does the ID of an SAP-predefined Space refer to?

Options:

A.

The business roles it is to be assigned to

B.

The business area it was designed for

C.

The software release it was created for

D.

The SAP Fiori applications it was defined for

Question 10

Which tool can you use to modify the entities schema content across multiple repositories?

Options:

A.

SAP Business Application Studio

B.

SAP BTP Account Explorer

C.

SAP Cloud Identity Services Transformation Editor

D.

SAP Cloud Identity Services Schemas app

Question 11

What do you configure the Social Media deny providers?

Options:

A.

In the SAP BTP Cockpit Account Explorer

B.

In the code editor of the SAP Business Application Studio

C.

In the administration console for SAP Cloud identity Services

Question 12

When creating PFCG roles for SAP Fiori access, what is included automatically when adding a catalog to the menu of a back-end PFCG role? Note: There are 2correct answers to this question.

Options:

A.

The start authorizations and the authorization default values for each IWSG TADIR service definitions in the catalog.

B.

The start authorizations and the authorization default values for each IWSV TADIR service definitions in the catalog.

C.

The IWSG TADIR service definitions from the catalog.

D.

The IWSV TADIR service definitions from the catalog.

Question 13

When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3correct answers to this question.

Options:

A.

One authorization data administrator

B.

One user administrator per production system

C.

One authorization profile administrator

D.

One user administrator per application area in the production system

E.

One decentralized role administrator

Question 14

When performing a comparison from the imparting role, what happens to the organizational level field values in the derived role? Note: There are 2correct answers to this question.

Options:

A.

Data for organizational levels is always transferred when authorization data for the derived role is modified.

B.

Data for organizational levels that have already been maintained in the derived role is NOT overwritten.

C.

Data for organizational levels is transferred only when authorization data for the derived role is first modified.

D.

Data for organizational levels that have already been maintained in the derived role is overwritten.

Question 15

In the administration console of the Cloud Identity Services, which authentication providers are available? Note: There are 2correct answers to this question.

Options:

A.

FieldGlass

B.

Successfactors

C.

Concur

D.

Ariba

Question 16

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

Options:

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Question 17

Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?

Options:

A.

SAP EarlyWatch Alert

B.

SAP Enterprise Threat Detection

C.

SAP Code Vulnerability Analyzer

D.

SAP Security Optimization Services

Question 18

Which SAP Fiori deployment option requires the Cloud connector?

Options:

A.

SAP Fiori for SAP S/4HANA standalone front-end server

B.

SAP S/4HANA embedded

C.

SAP Business Technology Platform

D.

SAP S/4HANA Cloud Public Edition

Question 19

What authorization object can be used to authorize an administrator to create specific authorizations in roles?

Options:

A.

S_USER_AUT

B.

S_USER_VAL

C.

S_USER_AGR

D.

S_USER_TCD

Question 20

What is the authorization object required to define the start authorization for an SAP Fiori legacy Web Dynpro application?

Options:

A.

S_SDSAUTH

B.

S_START

C.

S_TCODE

D.

S_SERVICE

Question 21

Which of the following rules does SAP recommend you consider when you define a role-naming convention for an SAP S/4HANA on-premise system?Note: There are 3correct answers to this question.

Options:

A.

Role names must NOT start with "SAP"

B.

Role names are system language-independent

C.

Role names can be no longer than 20 characters

D.

Role names are system language-dependent

E.

Role names can be no longer than 30 characters

Question 22

Which cloud-based SAP solution helps organizations control their data across various cloud platforms and on-premise data sources?

Options:

A.

SAP Identity Access Governance

B.

SAP Privacy Governance

C.

SAP Data Custodian

D.

SAP Information Steward

Question 23

You are building a PFCG role for access to an SAP Fiori app on your SAP S/4HANA on-premise system. After you enter the catalog in the role menu, an entry for an OData service is missing and you have to add it manually to the role menu.When you maintain authorization data in the PFCG role, why does SAP recommend that you NOT maintain the SRV_NAME field value of the S_SERVICE authorization object manually?

Options:

A.

Because the TADIR Service name is the same for the front-end server component and the back-end server component.

B.

Because the TADIR Service name for the back-end server component was automatically added to the role menu.

C.

Because the SRV_NAME hash value for the front-end server component and back-end server component are the same.

D.

Because the SRV_NAME hash value for the front-end server component and back-endserver component are different.

Question 24

What must you do if you want to enforce an additional authorization check when a user starts an SAP transaction?

Options:

A.

Assign authorization object S_START to the chosen transaction code with transaction SU24 and specify the Program ID and Object Type.

B.

Assign the authorization object to be checked to the chosen transaction code in the SAP Default authorization data using transaction SU22 and set Check Indicator to "Check".

C.

Assign the authorization object to be checked to the chosen transaction code with transaction SU24 and set Default Status to "Yes".

D.

Assign the authorization object and permissions to the chosen transaction code using transaction SE93.

Page: 1 / 8
Total 80 questions