Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

SAP C_SEC_2405 SAP Certified Associate - Security Administrator Exam Practice Test

Page: 1 / 8
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Question 1

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3 correct answers to this question.

Options:

A.

Analyze authorization check results for missing authorizations

B.

Display business roles granting specific access

C.

Adjust role restrictions to account for missing authorizations

D.

Analyze authorization check results for already assigned authorizations

E.

Adjust role restrictions to further limit access when performing forensic analysis

Question 2

Where do you configure the Social Media identity providers?

Options:

A.

In the code editor of the SAP Business Application Studio

B.

In the SAP BTP Cockpit Account Explorer

C.

In the administration console for SAP Cloud Identity Services

Question 3

Which cryptographic libraries are provided by SAP? Note: There are 2 correct answers to this question.

Options:

A.

CommonCryptoLib

B.

SecLib

C.

Cryptlib

D.

SAPCRYPTOLIB

Question 4

In which order do you define the security-relevant objects in SAP BTP?

Question # 4

Question # 4

Options:

Question 5

What authorization object can be used to authorize an administrator to create specific authorizations in roles?

Options:

A.

S_USER_VAL

B.

S_USER_TCD

C.

S_USER_AGR

D.

S_USER_AUT

Question 6

In the administration console of the Cloud Identity Services, which authentication providers are available? Note: There are 2 correct answers to this question.

Options:

A.

Successfactors

B.

Concur

C.

Ariba

D.

Fieldglass

Question 7

What is required to centrally administer a user's master record using Central User Administration? Note: There are 3 correct answers to this question.

Options:

A.

An ALE distribution model

B.

An RFC destination to the target system

C.

An RFC destination to the target client

D.

An existing master record in the target client for the user

E.

An entry in transaction BD54 for the child system

Question 8

Which privilege types are available in SAP HANA Cloud? Note: There are 3 correct answers to this question.

Options:

A.

System

B.

Analytic

C.

Application

D.

Package

E.

Object

Question 9

Which cybersecurity type does NOT focus on protecting connected devices?

Options:

A.

Application security

B.

Cloud security

C.

Network security

D.

IoT security

Question 10

When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3 correct answers to this question.

Options:

A.

One user administrator per application area in the production system

B.

One user administrator per production system

C.

One authorization profile administrator

D.

One authorization data administrator

E.

One decentralized role administrator

Question 11

Which log types are available in the Administration Console of Cloud Identity Services? Note: There are 2 correct answers to this question.

Options:

A.

Usage logs

B.

Troubleshooting logs

C.

Change logs

D.

Performance logs

Question 12

What are some disadvantages of a Composite Role? Note: There are 2 correct answers to this question.

Options:

A.

Changes to the included roles are not immediately visible in the composite role menu, requiring a renewed import.

B.

Menus from the included roles cannot be mixed.

C.

Changes to the authorizations can only be made using the included roles.

D.

Transactions that are deleted from the Composite Role menu are also removed from the included roles.

Question 13

Which protocol is the industry standard for provisioning identity and access management in hybrid landscapes?

Options:

A.

SCIM

B.

SAML

C.

OIDC

D.

SSL

Question 14

If you want to evaluate catalog menu entries and authorization default values of IWSG and IWSV applications, which SUIM reports would you use? Note: There are 2 correct answers to this question.

Options:

A.

Search Applications in Roles

B.

By Transaction Assignment in Menu

C.

Search Startable Applications in Roles

D.

By Authorization Object

Question 15

SAP BTP distinguishes between which of the following users? Note: There are 2 correct answers to this question.

Options:

A.

Key users

B.

Technical users

C.

Business users

D.

Platform users

Question 16

What is the authorization object required to define the start authorization for an SAP Fiori legacy Web Dynpro application?

Options:

A.

S_SERVICE

B.

S_START

C.

S_SDSAUTH

D.

S_TCODE

Question 17

In SAP S/4HANA Cloud Public Edition, which of the following can you change in a derived business role if the "Inherit Spaces in Derived Business Roles" checkbox is NOT selected in the leading business role?

Options:

A.

Business Role Template

B.

Restrictions

C.

Business Catalogs

D.

Pages

Question 18

In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2 correct answers to this question.

Options:

A.

Subaccount

B.

Global Account

C.

Directory

D.

Organization

Question 19

In SAP HANA Cloud, who has access to a database object?

Options:

A.

The creator and the schema owner

B.

The user DBADMIN and the group owner

C.

The owner and the SAP-owned users

D.

The user SYSTEM and the creator

Question 20

What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3 correct answers to this question.

Options:

A.

Role maintenance reads applications from a catalog.

B.

Role maintenance reads applications from role menus.

C.

Manual role authorizations are supported in custom catalogs.

D.

Authorization defaults define role authorizations.

E.

Catalogs are assigned to role menus.

Question 21

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2 correct answers to this question.

Options:

A.

Authorization privileges

B.

Client connect restrictions

C.

Identity providers

D.

Password policy settings

Question 22

What authorization object can be used to restrict which users a security administrator is authorized to maintain?

Options:

A.

S_USER_GRP

B.

S_USER_SAS

C.

S_USER_GRD

D.

S_USER_AUT

Question 23

How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3 correct answers to this question.

Options:

A.

By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.

B.

By supporting content activation at the business role level, including SAP Fiori apps and all associated Web Dynpro for ABAP applications.

C.

By helping customers to start exploring SAP Fiori in SAP S/4HANA on premises as quickly as possible.

D.

By allowing customers to select and activate SAP Fiori apps one by one, independent of dependencies needed for app-to-app navigation.

E.

By allowing customers to select individual SAP Fiori apps for their end-to-end business processes.

Question 24

Which limitations apply to restricted users in SAP HANA Cloud? Note: There are 3 correct answers to this question.

Options:

A.

They only have full SQL access via the SQL console.

B.

They can only connect to the database using HTTP/HTTPS.

C.

They cannot connect via ODBC or JDBC.

D.

They cannot create objects in the database.

E.

They can only create objects in their own database schema.

Page: 1 / 8
Total 80 questions