Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

SAP C_SEC_2405 SAP Certified Associate - Security Administrator Exam Practice Test

Page: 1 / 8
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

Options:

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Question 2

What authorization object can be used to restrict which users a security administrator is authorized to maintain?

Options:

A.

S_USER_GRD

B.

S_USER_AUTO

C.

S_USER_SASO

D.

S_USER_GRP

Question 3

Which of the following is part of the SAP S/4HANA central UI component?

Options:

A.

SAP Fiori launchpad

B.

SAP Fiori object page

C.

SAP Fiori analytical application

D.

SAP Fiori transactional application

Question 4

An authorization based on what object is required for trusted system access to an SAP Fiori back-end server?

Options:

A.

S_RFC

B.

S_RFCACL

C.

S_SERVICE

D.

S_START

Question 5

In which order do you define the security-relevant objects in SAP BTP?

Options:

A.

Role collection

B.

Role template

C.

Role3

Question 6

When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3correct answers to this question.

Options:

A.

One authorization data administrator

B.

One user administrator per production system

C.

One authorization profile administrator

D.

One user administrator per application area in the production system

E.

One decentralized role administrator

Question 7

What authorization object can be used to authorize an administrator to create specific authorizations in roles?

Options:

A.

S_USER_AUT

B.

S_USER_VAL

C.

S_USER_AGR

D.

S_USER_TCD

Question 8

Where can you find information on the SAP-delivered default authorization object and value assignments? Note: There are 2correct answers to this question.

Options:

A.

USOBT_C

B.

USOBT

C.

SU22

D.

SU24

Question 9

Which of the following allow you to control the assignment of table authorization groups? Note: There are 2correct answers to this question.

Options:

A.

PRGN_CUST

B.

V_DDAT_54

C.

V_BRG_54

D.

SSM_CUST

Question 10

What do you configure the Social Media deny providers?

Options:

A.

In the SAP BTP Cockpit Account Explorer

B.

In the code editor of the SAP Business Application Studio

C.

In the administration console for SAP Cloud identity Services

Question 11

SAP BTP distinguishes between which of the following users? Note: There are 2correct answers to this question.

Options:

A.

Business users

B.

Technical users

C.

Platform users

D.

Key users

Question 12

For which of the following can transformation variables be used?

Options:

A.

To save data to the output JSON file

B.

To save data permanently

C.

To save data temporarily

Question 13

Which log types are available in the Administration Console of Cloud Identity Services? Note: There are 2correct answers to this question.

Options:

A.

Change logs

B.

Troubleshooting logs

C.

Performance logs

D.

Usage logs

Question 14

In S/4HANA on-premise, which of the following combinations is required to grant a business user access to data from a Core Data Services (CDS) view using the standard ABAP authorization concept and authorization object S_RS_AUTH?

Options:

A.

•A CDS role with access conditions based on authorization object S_RS_AUTH,

•APFCG role with authorization for object S_RS_AUTH and assignment of the PFCG role

•The CDS role to the business user.

B.

•A CDS role with access conditions based on authorization object S_RS_AUTH

•APFCG role containing the CDS role and access conditions based up authorization object S_RS_AUTH

•Assignment of the PFCG role to the business user. C.

C.

•ACDS role with access conditions based on authorization object S_RS_AUTH

•A PFCG role with authorization for object S_RS_AUTH

•Assignment of the PFCG role to the business user. D.

D.

•A CDS role with access conditions based on authorization object S_RS_AUTH

•APFCG role containing the CDS role and access conditions based up authorization object S_RS_AUTH

•Assignment of the PFCG role and the CDS role to the business user.

Question 15

What does SAP recommend you do when you transport a custom leading business role in SAPS/4HANA Cloud Public Edition?

Options:

A.

Add all other leading business roles from the same Line of Business as dependencies to the Software Collection.

B.

Add all derived business roles as dependencies to the Software Collection.

C.

Add the pre-delivered business role that was used as a template to create the custom leading business role to the Software Collection.

Question 16

If you want to evaluate catalog menu entries and authorization default values of IWSG and IWSV applications, which SUIM reports would you use? Note: There are 2correct answers to this question.

Options:

A.

Search Startable Applications in Roles

B.

Search Applications in Roles

C.

Roles By Transaction Assignment in Menu

D.

Roles By Authorization Object

Question 17

Which of the following are SAP Fiori Launchpad functionalities? Note: There are 2correct answers to this question.

Options:

A.

Spaces

B.

SAP GUI

C.

Web Dynpro

D.

User Actions Menu

Question 18

In the administration console of the Cloud Identity Services, which system property types can you add? Note: There are 2correct answers to this question.

Options:

A.

Standard

B.

Internal

C.

Credential

D.

Default

Question 19

What are some disadvantages of a Composite Role? Note: There are 2correct answers to thisquestion.

Options:

A.

Changes to the authorizations can only be made using the included roles.

B.

Transactions that are deleted from the Composite Role menu are also removed from the included roles.

C.

Changes to the included roles are not immediately visible in the composite role menu, requiring a renewed import.

D.

Menus from the included roles cannot be mixed.

Question 20

Which user type in SAP S/4HANA Cloud Public Edition is used for API access, system integration, and scenarios where automated data exchange is required?

Options:

A.

SAP Communication User

B.

SAP Technical User

C.

SAP Administrative User

D.

SAP Support User

Question 21

When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?

Options:

A.

TADIR G4BA-SAP Gateway Odata V4 Backend Service Group & Assignments

B.

TADIR IWSV - SAP Gateway Business Suite Enablement-Service

C.

TADIR IWSG - SAP Gateway: Service Groups Metadata

D.

TADIR INA1 InA Service

Question 22

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3correct answers to this question.

Options:

A.

Display business roles granting specific access

B.

Adjust role restrictions to further limit access when performing forensic analysis

C.

Analyze authorization check results for missing authorizations

D.

Adjust role restrictions to account for missing authorizations

E.

Analyze authorization check results for already assigned authorizations

Question 23

What is required to centrally administer a user's master record using Central User Administration? Note: There are 3correct answers to this question.

Options:

A.

An RFC destination to the target system

B.

An RFC destination to the target client

C.

An existing master record in the target client for the user

D.

An ALE distribution model

E.

An entry in transaction BD54 for the child system

Question 24

Which cryptographic libraries are provided by SAP? Note: There are 2correct answers to this question.

Options:

A.

Cryptlib

B.

SecLib

C.

SAPCRYPTOLIB

D.

CommonCryptoLib

Page: 1 / 8
Total 80 questions