Question 16
Which of the following checks are performed for SAProuter by the SAP Security Optimization Service?
Note: There are 3 correct Answers to this question.
Question 17
Which of the following accurately describe a Composite Role? Note: There are 2 correct answer to this question.
Question 18
Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)?
Note: There are 3 correct Answers to this question.
Question 19
Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? Note: There are 2 correct Answers to this question.
Question 20
Which of the following are prerequisites for using transaction PFCG? Note: There are 2 correct Answers to this question.
