SAP c-secauth-20 practice test

SAP Certified Technology Associate - SAP System Security and Authorizations Exam

Question 1

You are Configuring authorizations to secure access to table data using transaction SM31 and you
encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure

  • A. It allows you to specify access to tables associated with a specific authorization group
  • B. It allows you specify access to specific client-dependent table
  • C. It allows you specify access to a specific client independent table
  • D. It allows you specify access to tables reference by a specific program group



Question 2

Which of the following checks performed for SAProuter by the SAP security optimization service
(SOS)? Note: There are 3 correct answer to this question.

  • A. Secure Network Communication Check
  • B. Saprouttab Check
  • C. User Management Check
  • D. Operating System Access Check
  • E. Password Check

A, B, D


Question 3

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? Note:
There are 2 correct answer to this question.

  • A. To recommend SAP Hot News Notes (priority 1 and 2)
  • B. To recommend Legal Change Notes related to SAP innovations
  • C. To recommend Performance Notes to improve system response
  • D. To recommend SAP security Notes for evaluation

C, D


Question 4

Which of the various protocols can be used to establish secure communication? Note: There are 3
correct answer to this question.

  • A. From Secure Login Server to LDAP Server : HTTPS (SSL)
  • B. From Secure Login Server to SAP Netweaver : RFC (SNC)
  • C. From Business Explorer to SAP Netweaver : DIAG/RFC (SNC), HTTPS (SSL)
  • D. From Secure Login Client to Secure Login Server: DIAG/RFC (SNC), HTTPS, RADIUS
  • E. From SAP GUI to SAP Netweaver : DIAG/RFC (SNC)

A, B, E


Question 5

You want to adjust check indicator values for certain authorization object delivered by SAP. In which
of the following tables should your adjustments be recorded?

  • A. USOBX_C
  • B. USOBT_C
  • D. USOBX



Question 6

Which configuration options apply to the usage of VCLIENT in the parameter icm /server_port_<xx>?
Note: There are 3 correct answer to this question.

  • A. VCLIENT default value is 0
  • B. VCLIENT value must be specified if SSL configuration is defined by SSLCONFIG
  • C. VCLIENT default value is 1
  • D. VCLIENT = 0, which notifies the SSL server that no SSL client verification is needed
  • E. VCLIENT = 1 the server asks the client to transfer a certificate

C, D, E


Question 7

Which of the following defines "Phishing"?

  • A. Overloading an application with request
  • B. Acquiring sensitive information by masquerading as trustworthy entity
  • C. Modifying an IP address of the source of the TCP/IP packet
  • D. Pretending to be another user



Question 8

What is the main purpose of SAP Access Control, as an enterprise software solution?

  • A. Manage corporate social media presence
  • B. Secure authentication for cloud and on-premise
  • C. Identify security risk and document compliance
  • D. Deployment of encryption services



Question 9

The report "Search for Application in Role Menu" can be called via which of the following options?
Note: There are 2 correct answer to this question.

  • A. Transaction SUIM (menu node "Roles")
  • B. Transaction RSUSR_ROLE_MENU
  • C. Transaction RSUSR_START_APPL
  • D. Transaction SUIM, (Menu node " Change Documents")

A, B


Question 10

Which of the following features are provided by the SAP Fiori Launchpad content Manager? Note:
There are 3 correct answer to this question.

  • A. Activate 0 Data Services
  • B. Create and Configure Groups
  • C. Create and Configure Catalogs
  • D. Display the issue with SAP Fiori Launchpad Content
  • E. Display role assignments for Catalogs

C, D, E

To page 2