P_TSEC10_75試験無料問題集「SAP Certified Technology Professional - System Security Architect 認定」

What is the profile parameter to define the maximum of filters that can be used?

Which authorization object helps you to enforce the role naming convention in restricting the allowed roles names?

Which profile parameter set the time for automatic SAPGUI logout?

Authorization that defines which field values an administrator may enter in roles for which authorization object and which fields?

What are the 3 trust manager profile parameters?

正解:A,B,D 解答を投票する
Which is the only user in the SAP system for which no user master record is required (since it is defined in the code)?

Which authorization object grants authorization to maintain crossclient tables with the standard table maintenance transaction?

In which 4 cases Secure Store and Forward (SSF) provides security for SAP data and documents?

正解:A,B,C,D 解答を投票する
What 3 security goals answer the digital signature?

正解:A,C,D 解答を投票する
Which kind of attack makes the server unavailable?
There are several ways to do this, such as snap the network cable, physically destroy the server, or unplug it from the network.

4 types of security audit log filters?

正解:A,B,D,E 解答を投票する
The security policies are created by the security team in isolation from the business team. Determine whether this statement is true or false.