Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? (Choose two.)
A. /IWFND/MAINT_SERVICE
B. /UI2/GW_MAINT_SRV
C. /IWFND/GW_SYS_ALIAS
D. /IWFND/GW_CLIENT
Which CDS-related repository object types are provided with ABAP CDS? (Choose three.)
A. CDS View Entity
B. Metadata Extensions
C. SQL View
D. Access Control
E. Data Definition
Which of the following accurately describe Solution Manager functionality? (Choose three.)
A. System recommendations provide a worklist of potentially relevant security notes.
B. Configuration validation helps to standardize and harmonize security-related configuration items for ABAP systems only.
C. SAP SOS self-service is a convenient entry point to introduce security monitoring.
D. Configuration validation can check if security policies were applied.
E. SAP EWA provides the most comprehensive security check.
Which values are permitted for the S_BTCH_JOB authorization object? (Choose three.)
A. DELE
B. 01 (Create)
C. RELE
D. SHOW
E. 02 (Change)
Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? (Choose two.)
A. S_RZL_ADM
B. S_BTCH_EXT
C. S_LOG_COM
D. S_PROGRAM
Which of the following describes an Authorization Object class?
A. It defines a group of 1 to 10 authorization fields together.
B. It defines the smallest unit against which an authorization check can be run.
C. It defines a logical grouping of authorization objects.
D. It defines authorizations for different authorization objects.
When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provided? (Choose three.)
A. UI access to the Apps
B. SAP Favorites
C. Start Authorizations for OData services
D. Catalog for the Start Authorization
E. WAPA Business Server Pages
Which of the following describe SAP Fiori Tile Target Mapping? (Choose two.)
A. It defines the target application which is launched.
B. It is part of the SAP Fiori Launchpad configuration.
C. It represents the visual part of a tile.
D. It is defined within an SAP Tile Group.
Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?
A. Logging
B. Configuration
C. Activation
D. Evaluation
You are configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be used to secure access?
A. It allows you to specify access to a specific client-independent table.
B. It allows you to specify access to tables referenced by a specific program group.
C. It allows you to specify access to tables associated with a specific authorization group.
D. It allows you to specify access to a specific client-dependent table.
Which of the following tables contain transport request object lists and table entry keys? (Choose two.)
A. E071K
B. E070
C. E070L
D. E071
When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)
A. If the PFCG role menu contains SAP Fiori Tile Groups
B. If the PFCG roles contain all of the start authorizations required for the application
C. If there is an application start lock
D. If the PFCG roles are assigned to end users
Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.)
A. Data Destruction
B. Data Archiving
C. Data Retention
D. Data Logging
E. Alert Notification
Which of the following are phases in the SAP Audit Management auditing process? (Choose three.)
A. Monitoring Progress
B. Engagement Planning
C. Remediation Analysis
D. Communicating Results
E. Mitigation Review
Which transaction code allows you to configure the SAP Security Audit Log?
A. SM19
B. SM20
C. SM18
D. SUIM