A user has the authorization to execute SP01. What can this user access with authorization object S_ SPO_ ACT when the 'Value for Authorization Check' field is set to "_USER?
A. All spool requests for all users in the client
B. All spool requests for users in the same user group
C. User's own spool requests
D. All spool requests for a specific user in the client
You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations?
A. By using the statement AUTHORITY-CHECK in the access control of the CDS view
B. By defining access conditions in an access rule for the CDS view
C. By assigning the CDS view to the authorization profile in PFCG
D. By defining the CDS view in the authorization object in SU21
Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web Administration interface? Note: There are 2 correct answers to this question.
A. Use a separate port for the content
B. Use access restrictions with the icm/HTTP/auth_
C. Use subparameter ALLOWPUB = FALSE of the profile parameter icm/server_port_
D. Use Secure Socket Layer (SSL) for password encrypt on
You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system.
Which field distribution parameter do you maintain?
A. Redistribution
B. Local
C. Global
D. Proposal
How can you protect a table containing sensitive data using the authorization object S_TABU_DIS?
A. The tables containing sensitive data must be associated with table groups in table TBRG.
B. The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.
C. Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables
D. The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can then be filled with *.
Insufficient authorization checks might allow A BAP programs to access the PSE files. Which authorization objects should we check to protect the PSEs? Note: There are 2 correct answers to this question.
A. S_RZL_ADM
B. S_DATASET
C. S_ADMI_FCD
D. S_DEVELOP
You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the Code Vulnerability Analyzer (CVA) for carrying out these extended security checks.
What needs to be done for this purpose? Note: There are 2 correct answers to this question.
A. Execute transaction ST12 to start the analysis
B. Execute program RSLIN_SEC_LICENSE_SETUP
C. Run CVA from the ABAP Test Cockpit
D. Run CVA from the ABAP Trace
A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping.
At what level are you going to check the target mapping?
A. O At the catalog level in the SAP Fiori front-end server
B. O At the group level in the SAP Fiori front-end server
C. O At the group level in the SAP Fiori Launchpad
D. O At the application level in the Web IDE
What reference is used to connect multiple Cloud Connectors to one SAP Cloud Platform subaccount?
A. System Alias
B. Location ID
C. Instance ID
D. Virtual Host
You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.
A. Authenticates the user's credentials
B. Uses SAP logon groups to determine which requests are directed to which server
C. Checks current state of the message server
D. Decrypts the HTTPS request and then selects the server