[2022] Use Valid Exam C-SECAUTH-20 by Actual4Exams Books For Free Website
Free SAP Certified Technology Associate C-SECAUTH-20 Official Cert Guide PDF Download
NEW QUESTION 34
You want to limit an authorization administrator so that they can only assign certain authorizations.
Which authorization object should you use?
- A. S_USER_ADM
- B. S_USER_VAL
- C. S_USER_AGR
- D. S_USER_TCD
Answer: B
NEW QUESTION 35
Which authorization is required to modify authorization data of derived roles?
- A. S_USER_AGR
- B. S_USER_AUT
- C. S_USER_SYS
- D. S_USER_VAL
Answer: A
NEW QUESTION 36
Which CDS-related repository object types are provided with ABAP CDS? Note: There are 3 correct Answers to this question.
- A. Metadata Extensions
- B. SQL View
- C. CDS View Entity
- D. Data Definition
- E. Access Control
Answer: A,D,E
NEW QUESTION 37
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? Note: There are 2 correct Answers to this question.
- A. Deprovisioning of problematic ABAP code
- B. Direct integration with Root Cause Analysis
- C. Static and Dynamic Application Security Testing
- D. Capture of manual and automated check executions
Answer: C,D
NEW QUESTION 38
Which of the following actions are required to ensure complete logging of table data changes? Note: There are
3 correct answer to this question.
- A. Log Data changes must be enable at the table level in transaction SE13
- B. Instance profile parameter rec/client must be maintained for client
- C. The security log must be activated using transaction SM19
- D. Parameter RECCLIENT must be maintained in transaction STMS
- E. Client change option must be set to Automatic Recording of changes
Answer: A,B,D
NEW QUESTION 39
Which of the following defines "Phishing"?
- A. Acquiring sensitive information by masquerading as trustworthy entity
- B. Pretending to be another user
- C. Modifying an IP address of the source of the TCP/IP packet
- D. Overloading an application with request
Answer: A
NEW QUESTION 40
Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad?
- A. S_SERVICE
- B. S_START
- C. S_TCODE
- D. S_PERSONAS
Answer: B
NEW QUESTION 41
Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?
- A. The service provider queries the user for authentication credentials.
- B. The service provider redirects the user to an identity provider and includes a SAML artifact referring to the authentication request.
- C. The identity provider gets the authentication response from the service provider over a SOAP channel.
- D. The service provider gets the authentication request from the identity provider over a SOAP channel.
Answer: B
NEW QUESTION 42
How can you enforce an additional transaction start authorization check for custom transaction?
- A. For each role containing the custom transaction, add the desired authorization object manually in transaction PFCG, maintained the field values and then generate the profile.
- B. Without additional custom development it is not possible to add another check during transaction start.
- C. Using Transaction SE93 , update the custom transaction definition by specifying the desired authorization object and maintaining the desired field values.
- D. Maintain the SU24 entry for the custom transaction and adding the desired authorization object, setting the Check Indicator to "Check" and setting Proposal to Yes.
Answer: D
NEW QUESTION 43
What is the purpose of securing sensitive business data? Note: There are 3 correct answer to this question.
- A. Correctness of Data
- B. Protection Image
- C. Disruption of software deployment
- D. Reduction of training Cost
- E. Protection of Intellectual property
Answer: B,C,E
NEW QUESTION 44
Which ABAP transaction codes are relevant for SNC parameter configuration? Note: There are 2 correct answer to this question.
- A. SNCCONFIG
- B. SNCO
- C. SNCWIZARD
- D. STRUST
Answer: A,C
NEW QUESTION 45
In the case of missing OData authorizations, why is it not recommended to maintain S_SERVICE manually within an SAP Fiori authorization role? Note: There are 2 correct Answers to this question.
- A. Both front-end and back-end entries are generating the same S_SERVICE authorization object with the same authorization values.
- B. Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values.
- C. The SRV_NAME value of the S_SERVICE authorization object is the name of an OData service.
- D. The SRV_NAME value of the S_SERVICE authorization object is the hash value of an OData service.
Answer: B,D
NEW QUESTION 46
Which of the following app-specific types of entities do users need to use SAP Fiori apps? Note: There are 2 correct Answers to this question.
- A. Parameters
- B. Authorizations
- C. UI
- D. Master Data
Answer: B,C
NEW QUESTION 47
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? Note: There are
2 correct answer to this question.
- A. Deprovisioning of problematic ABAP code
- B. Direct integration with Root Cause Analysis
- C. Static and Dynamic Application Security Testing
- D. Capture of manual and automated check execution
Answer: C,D
NEW QUESTION 48
You are Configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure access?
- A. It allows you to specify access to tables associated with a specific authorization group
- B. It allows you specify access to tables reference by a specific program group
- C. It allows you specify access to specific client-dependent table
- D. It allows you specify access to a specific client independent table
Answer: A
NEW QUESTION 49
Which of the following features are provided by the SAP Fiori Launchpad content Manager? Note: There are 3 correct answer to this question.
- A. Create and Configure Groups
- B. Create and Configure Catalogs
- C. Activate 0 Data Services
- D. Display the issue with SAP Fiori Launchpad Content
- E. Display role assignments for Catalogs
Answer: B,D,E
NEW QUESTION 50
Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?
- A. SAP Information Steward
- B. SAP Process Control
- C. SAP Data Services
- D. SAP Information LifeCycle Management
Answer: C
NEW QUESTION 51
Which of the following accurately describes the role/profile SAP_NEW? Note: There are 2 correct Answers to this question.
- A. Organizational levels need to be maintained in profile SAP_NEW.
- B. The profile SAP_NEW provides authorization for all new objects and objects changed by release.
- C. The role SAP_NEW must be generated in accordance with the system environment using the report REGENERATE_SAP_NEW.
- D. The role SAP_NEW does not guarantee backward compatibility for all scenarios.
Answer: B,C
NEW QUESTION 52
Which of the following are prerequisites for using transaction PFCG? Note: There are 2 correct Answers to this question.
- A. Fill in initials values for customer tables using transaction SU25
- B. Generate Standard Role SAP_NEW using transaction SU25
- C. Maintain parameter auth/no_check_in_some_cases = Y
- D. Maintain the Check Indicators for Critical Authorization objects
Answer: A,C
NEW QUESTION 53
How can you protect a system when you do not want the user assignments for a role to be transported?
- A. Restrict access to the user assignment tab in PFCG in the target system
- B. Restrict access to the user assignment tab in PFCG in the development system
- C. Restrict import of users in table PRGN_CUST in the development system
- D. Restrict import of users in table PRGN_CUST in the target system
Answer: D
NEW QUESTION 54
In SAP S/4HANA Cloud authorization objects are grouped into which item?
- A. Privileges
- B. Single technical roles
- C. Groups
- D. Business roles
Answer: D
NEW QUESTION 55
Which of the following parameters must be configured to capture log data in the Security Audit Log?
- A. rsau/enable
- B. dir_logging
- C. rec/client
- D. rdisp/TRACE
Answer: A
NEW QUESTION 56
......
SAP C-SECAUTH-20 Official Cert Guide PDF: https://www.actual4exams.com/C-SECAUTH-20-valid-dump.html