Question 16
Which of the following defines "Phishing"?
Question 17
You want to limit an authorization administrator so that they can only assign certain authorizations. Which authorization object should you use?
Question 18
Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?
Question 19
When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following item should be provided?
Note: There are 3 correct answer to this question.
Question 20
Which of the following SUIM report can you use to determine if a user has segregation of duty violation?
Note: There are 2 correct answer to this question.
