Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

SAP C_SEC_2405 - SAP Certified Associate - Security Administrator

Page: 1 / 3
Total 80 questions

If you want to evaluate catalog menu entries and authorization default values of IWSG and IWSV applications, which SUIM reports would you use? Note: There are 2 correct answers to this question.

A.

Search Applications in Roles

B.

By Transaction Assignment in Menu

C.

Search Startable Applications in Roles

D.

By Authorization Object

Under which of the following conditions can you merge authorizations for the same object during role maintenance? Note: There are 2 correct answers to this question.

A.

The activation status of a manual authorization must match the status of the changed authorizations.

B.

The activation status and the maintenance status of the authorizations must match.

C.

The maintenance status of the changed authorizations must match the status of a manual authorization.

D.

The activation status and the maintenance status of the authorizations must NOT match.

Which protocol is the industry standard for provisioning identity and access management in hybrid landscapes?

A.

SCIM

B.

SAML

C.

OIDC

D.

SSL

What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3 correct answers to this question.

A.

Conceal keys

B.

Store keys

C.

Rotate keys

D.

Transmit keys

E.

Generate keys

What is required to centrally administer a user's master record using Central User Administration? Note: There are 3 correct answers to this question.

A.

An ALE distribution model

B.

An RFC destination to the target system

C.

An RFC destination to the target client

D.

An existing master record in the target client for the user

E.

An entry in transaction BD54 for the child system

Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?

A.

SAP Code Vulnerability Analyzer

B.

SAP Security Optimization Services

C.

SAP EarlyWatch Alert

D.

SAP Enterprise Threat Detection

In SAP S/4HANA Cloud Public Edition, which of the following can you change in a derived business role if the "Inherit Spaces in Derived Business Roles" checkbox is NOT selected in the leading business role?

A.

Business Role Template

B.

Restrictions

C.

Business Catalogs

D.

Pages

What authorization object can be used to authorize an administrator to create specific authorizations in roles?

A.

S_USER_VAL

B.

S_USER_TCD

C.

S_USER_AGR

D.

S_USER_AUT

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2 correct answers to this question.

A.

Authorization privileges

B.

Client connect restrictions

C.

Identity providers

D.

Password policy settings

Which of the following services does the Identity Authentication Service provide? Note: There are 2 correct answers to this question.

A.

Policy refinement

B.

Authentication

C.

Single Sign-On

D.

Central User Repository