An authorization based on what object is required for trusted system access to an SAP Fiori back-end server?
What must you do before you can use transaction PFCG? Note: There are 2 correct answers to this question.
What are some security safeguards categories? Note: There are 3 correct answers to this question.
If you want to evaluate catalog menu entries and authorization default values of IWSG and IWSV applications, which SUIM reports would you use? Note: There are 2 correct answers to this question.
How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3 correct answers to this question.
Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2 correct answers to this question.
What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3 correct answers to this question.
Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?
What use cases are available for a Local Identity Directory? Note: There are 3 correct answers to this question.
Which cloud-based SAP solution helps organizations control their data across various cloud platforms and on-premise data sources?