A. S_USER_AUT
B. S_USER_PRO
A. The user has the authorization for the object, but not for filed value
B. The user has no authorization
C. The user has the authorization for the object and the fields value
D. No profile is entered in the user master record
E. Check if an authorization object is assigned to the transaction code
A. ssf/name must be set to SAPSECULIB
B. ssf/ssfapi_lib, specify the location of the SAPCRYPTOLIB
C. Using groups at the creation dolmen level
D. sec/libsapsecu, specify the location of the SAPCRYPTOLIB
A. Transfer gate
B. Application gate
C. Web gate
A. S_AGFI_FCD
B. S_ADMI_FCD
C. S_AFGI_FCD
A. Higher level of transparency
B. Enables the reconstruction of a series of events
C. Slower level of transparency
D. Security-related changes
A. Ensure changes occur only on your production system.
B. You control when changes are moved into production.
C. Developers do not have access to production data.
D. Ensure changes occur only on development system.
E. You can test changes in a QA system
A. S_SPO_DEV
B. S_SVR_DEV
A. object S_RFC
B. RSRFCCHK
A. ACTV
B. DEVCLASS
C. C_Group
D. OBJTYPE (PROG)
E. OBJNAME
F. P_GROUP
A. Multiple Host
B. Single Host
C. Dual Host
A. ACTVT: Activity (09, 01)
B. ACTVT: Activity (05, 07)
C. ACTVT: Activity (02, 03)
D. DICBERCLS: Authorization group for ABAP Dictionary objects (only tables/views assigned to authorization group "V*" (DICBERCLS=V*) may be maintained.)
A. Connects the ITS to the Webserver
B. Use the HTML language
C. Use the HTTP protocol
A. Client
B. User
C. Unsecurity
D. Security Level
E. Audit Classes
A. CUST
B. DARK
C. TASK
D. DTRA
A. URDSAL
B. USRACL
C. URSLAA
A. Custom transaction codes can be easily created, without requiring any programming.
B. With your custom transaction code, you can look at any table.
C. With your custom transaction code, you can look only at the table specified in the transaction code.
D. You no longer need to grant access to transaction code SE16.