P_TSEC10_75試験無料問題集「SAP Certified Technology Professional - System Security Architect 認定」

What are the 5 majors authorisation objects used to protect which transaction codes a user can access and for which product are they meant to be?

正解:B,C,D 解答を投票する
For what is the Audit Information System (AIS) a checking tool?

正解:A,B,D,E 解答を投票する
What is the transaction for the system trace tool?

ITS: What are the 2 main functions of the Wgate (Webserver)?

Which program start the external command after it has passed the gateway?

What are the 4 different types of roles?

正解:A,B,C,D 解答を投票する
Which transaction displays the history of the system change options?

What is the default Communication RFC user set up for the transport management?

What is the field of the authorization object S_TABU_CLI

Which protocol is used between SAP Servers?

What are the 2 fields of the authorization object S_TABU_DIS

What are the 4 activities required for an upgrade of The Profile Generator?

正解:A,B,C,D 解答を投票する
The following logon parameters can be used to ensure your system is adequately secured.

正解:A,B,D 解答を投票する
What is the transaction for client copy between systems?

Which authorization object is provided to create and maintain users and assignments in a decentralized fashion with user groups?

The security policies are created by the security team in isolation from the business team. Determine whether this statement is true or false.

What is the difference between System Access Control and Role based Access control?

How do you protect access to the ITS service and template files?

Which special user is responsible for maintaining the ABAP Dictionary and the software logistics in the client
000?

Transaction code to maintain profile parameters?