Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

C_SEC_2405 Questions and Answers

Question # 6

What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3correct answers to this question.

A.

Authorization defaults define role authorizations.

B.

Role maintenance reads applications from role menus.

C.

Role maintenance reads applications from a catalog.

D.

Catalogs are assigned to role menus.

E.

Manual role authorizations are supported in custom catalogs.

Full Access
Question # 7

Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you perform a Modification Comparison using SU25.

What does this comparison do?

A.

It compares your changes to the SAP defaults in USOBX and USOBT with the new SAP defaults in the current release and allows you to make adjustments.

B.

It compares the Role Maintenance data from the current release with the data for the previous release and allows you to adjust any custom default values in tables USOBX and USOBT.

C.

It compares the Role Maintenance data from the previous release with the data for the current release and writes any new default values in tables USOBX_C and USOBT_C.

D.

It compares your changes to the SAP defaults in USOBX_C and USOBT_C with the new SAP defaults in the current release and allows you to make adjustments.

Full Access
Question # 8

How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3correct answers to this question.

A.

By helping customers to start exploring SAP Fiori in SAP S/4HANA on premises as quickly as possible.

B.

By supporting content activation at the business role level, including SAP Fiori apps and all associated Web Dynpro for ABAP applications.

C.

By allowing customers to select individual SAP Fiori apps for their end-to-end business processes.

D.

By allowing customers to select and activate SAP Fiori apps one by one, independent of dependencies needed for app-to-app navigation.

E.

By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.

Full Access
Question # 9

Which user type in SAP S/4HANA Cloud Public Edition is used for API access, system integration, and scenarios where automated data exchange is required?

A.

SAP Communication User

B.

SAP Technical User

C.

SAP Administrative User

D.

SAP Support User

Full Access
Question # 10

Which code does the authority-check return when a user does NOT have any authorizations for the authorization object checked?

A.

12

B.

16

C.

0

D.

4

Full Access
Question # 11

Which of the blowing functions within SAP GRC Access Control support access certification and review? Note: There are 2 correct answers totheQuestion.

A.

Role Ream

B.

GO

C.

Review CI User Reaffirm

D.

Role Review

Full Access
Question # 12

Which tool can you use to modify the entities schema content across multiple repositories?

A.

SAP Business Application Studio

B.

SAP BTP Account Explorer

C.

SAP Cloud Identity Services Transformation Editor

D.

SAP Cloud Identity Services Schemas app

Full Access
Question # 13

Which archiving objects are relevant for archiving change documents for user master records? Note: There are 2correct answers to this question.

A.

US_PROF

B.

US_USER

C.

US_AUTH

D.

US_PASS

Full Access
Question # 14

In SAP S/4HANA Cloud Public Edition, which of the following can you change in a derived business role if the "Inherit Spaces in Derived Business Roles" checkbox is NOT selected in the leading business role?

A.

Business Catalogs

B.

Business Role Template

C.

Pages

D.

Restrictions

Full Access
Question # 15

An authorization based on what object is required for trusted system access to an SAP Fiori back-end server?

A.

S_RFC

B.

S_RFCACL

C.

S_SERVICE

D.

S_START

Full Access
Question # 16

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Full Access
Question # 17

In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2correct answers to this question.

A.

Global Account

B.

Organization

C.

Subaccount

D.

Directory

Full Access
Question # 18

Which object type is assigned to activated OData services in transaction SU24?

A.

IWSV

B.

G4BA

C.

IWSG

D.

HTTP

Full Access
Question # 19

Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2correct answers to this question.

A.

S_ESH_CONN

B.

SDDLVIEW

C.

S_ESH_ADM

D.

RSDDLTIP

Full Access
Question # 20

Which of the following rules does SAP recommend you consider when you define a role-naming convention for an SAP S/4HANA on-premise system?Note: There are 3correct answers to this question.

A.

Role names must NOT start with "SAP"

B.

Role names are system language-independent

C.

Role names can be no longer than 20 characters

D.

Role names are system language-dependent

E.

Role names can be no longer than 30 characters

Full Access
Question # 21

For users with system administration authorization, which additional functions are provided by the SAP Easy Access menu? Note: There are 2correct answers to this question.

A.

Creating users

B.

Calling programs

C.

Creating roles

D.

Calling menus for roles and assigning them to users

Full Access
Question # 22

For which of the following can transformation variables be used?

A.

To save data to the output JSON file

B.

To save data permanently

C.

To save data temporarily

Full Access
Question # 23

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3correct answers to this question.

A.

Display business roles granting specific access

B.

Adjust role restrictions to further limit access when performing forensic analysis

C.

Analyze authorization check results for missing authorizations

D.

Adjust role restrictions to account for missing authorizations

E.

Analyze authorization check results for already assigned authorizations

Full Access
Question # 24

Which of the following services does the Identity Authentication Service provide? Note: There are 2correct answers to this question.

A.

Authentication

B.

Single Sign-On

C.

Central User Repository

D.

Policy refinement

Full Access