Certbus > SAP > SAP Certifications > C_SECAUTH_20 > C_SECAUTH_20 Online Practice Questions and Answers

C_SECAUTH_20 Online Practice Questions and Answers

Questions 4

Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? (Choose two.)

A. /IWFND/MAINT_SERVICE

B. /UI2/GW_MAINT_SRV

C. /IWFND/GW_SYS_ALIAS

D. /IWFND/GW_CLIENT

Browse 80 Q&As
Questions 5

Which CDS-related repository object types are provided with ABAP CDS? (Choose three.)

A. CDS View Entity

B. Metadata Extensions

C. SQL View

D. Access Control

E. Data Definition

Browse 80 Q&As
Questions 6

Which of the following accurately describe Solution Manager functionality? (Choose three.)

A. System recommendations provide a worklist of potentially relevant security notes.

B. Configuration validation helps to standardize and harmonize security-related configuration items for ABAP systems only.

C. SAP SOS self-service is a convenient entry point to introduce security monitoring.

D. Configuration validation can check if security policies were applied.

E. SAP EWA provides the most comprehensive security check.

Browse 80 Q&As
Questions 7

Which values are permitted for the S_BTCH_JOB authorization object? (Choose three.)

A. DELE

B. 01 (Create)

C. RELE

D. SHOW

E. 02 (Change)

Browse 80 Q&As
Questions 8

Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? (Choose two.)

A. S_RZL_ADM

B. S_BTCH_EXT

C. S_LOG_COM

D. S_PROGRAM

Browse 80 Q&As
Questions 9

Which of the following describes an Authorization Object class?

A. It defines a group of 1 to 10 authorization fields together.

B. It defines the smallest unit against which an authorization check can be run.

C. It defines a logical grouping of authorization objects.

D. It defines authorizations for different authorization objects.

Browse 80 Q&As
Questions 10

When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provided? (Choose three.)

A. UI access to the Apps

B. SAP Favorites

C. Start Authorizations for OData services

D. Catalog for the Start Authorization

E. WAPA Business Server Pages

Browse 80 Q&As
Questions 11

Which of the following describe SAP Fiori Tile Target Mapping? (Choose two.)

A. It defines the target application which is launched.

B. It is part of the SAP Fiori Launchpad configuration.

C. It represents the visual part of a tile.

D. It is defined within an SAP Tile Group.

Browse 80 Q&As
Questions 12

Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?

A. Logging

B. Configuration

C. Activation

D. Evaluation

Browse 80 Q&As
Questions 13

You are configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be used to secure access?

A. It allows you to specify access to a specific client-independent table.

B. It allows you to specify access to tables referenced by a specific program group.

C. It allows you to specify access to tables associated with a specific authorization group.

D. It allows you to specify access to a specific client-dependent table.

Browse 80 Q&As
Questions 14

Which of the following tables contain transport request object lists and table entry keys? (Choose two.)

A. E071K

B. E070

C. E070L

D. E071

Browse 80 Q&As
Questions 15

When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)

A. If the PFCG role menu contains SAP Fiori Tile Groups

B. If the PFCG roles contain all of the start authorizations required for the application

C. If there is an application start lock

D. If the PFCG roles are assigned to end users

Browse 80 Q&As
Questions 16

Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.)

A. Data Destruction

B. Data Archiving

C. Data Retention

D. Data Logging

E. Alert Notification

Browse 80 Q&As
Questions 17

Which of the following are phases in the SAP Audit Management auditing process? (Choose three.)

A. Monitoring Progress

B. Engagement Planning

C. Remediation Analysis

D. Communicating Results

E. Mitigation Review

Browse 80 Q&As
Questions 18

Which transaction code allows you to configure the SAP Security Audit Log?

A. SM19

B. SM20

C. SM18

D. SUIM

Browse 80 Q&As
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update: Mar 19, 2025
Questions: 80 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99