Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SAP C_SEC_2405 - SAP Certified Associate - Security Administrator

Page: 2 / 3
Total 80 questions

Where can you find information on the SAP-delivered default authorization object and value assignments? Note: There are 2 correct answers to this question.

A.

USOBT_C

B.

SU24

C.

SU22

D.

USOBT

Which optional components can be included when transporting a role definition from the development system to the quality assurance system? Note: There are 3 correct answers to this question.

A.

Direct user assignments

B.

Generated profiles of dependent roles

C.

Generated profiles of single roles

D.

Indirect user assignments

E.

Personalization data

Your developer has created a new custom transaction for your SAP S/4HANA on-premise system and has provided you a list of the authorizations needed to execute the new ABAP program. What must you do to ensure that each required authorization is automatically created every time this new custom transaction is added to a PFCG role?

A.

Maintain each authorization in transaction SU22 and set the Check Indicator value to "Check".

B.

Maintain each authorization object in transaction SU22 and set the Default Status to "Yes".

C.

Maintain each authorization in transaction SU24 and set the Default Status to "Yes".

D.

Maintain each authorization object in transaction SU24 and set the Default Status to "Yes".

What use cases are available for a Local Identity Directory? Note: There are 3 correct answers to this question.

A.

Merging attributes

B.

Classic use case

C.

Hybrid mode

D.

Proxy mode

E.

S/4HANA use case

In the administration console of the Cloud Identity Services, which authentication providers are available? Note: There are 2 correct answers to this question.

A.

Successfactors

B.

Concur

C.

Ariba

D.

Fieldglass

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3 correct answers to this question.

A.

Analyze authorization check results for missing authorizations

B.

Display business roles granting specific access

C.

Adjust role restrictions to account for missing authorizations

D.

Analyze authorization check results for already assigned authorizations

E.

Adjust role restrictions to further limit access when performing forensic analysis

What are some security safeguards categories? Note: There are 3 correct answers to this question.

A.

Access Control

B.

Physical

C.

Organizational

D.

Financial

E.

Technical

Which of the following is part of the SAP S/4HANA central UI component?

A.

SAP Fiori object page

B.

SAP Fiori transactional application

C.

SAP Fiori launchpad

D.

SAP Fiori analytical application

In the administration console of the Cloud Identity Services, which system property types can you add? Note: There are 2 correct answers to this question.

A.

Internal

B.

Credential

C.

Default

D.

Standard

What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3 correct answers to this question.

A.

It is prioritized.

B.

It is categorized.

C.

It is pseudonymized.

D.

It is normalized.

E.

It is enriched.