Q.1 ____________ is used to verify that security standards/policies/procedures are followed and exceptions are noted.
A. Authorization
B. Authentication
C. Identity
D. Security Monitoring
Ans : Security Monitoring
Q.2 _________ is the unique set of attributes a user has in the SAP system.
A. Authentication
B. Integrity
C. Authorization
D. Identity
Ans : Identity
Q.3 For maintaining strict standards of security compliance, the _________ transaction is extremely important.
A. UISM
B. MUIS
C. SUM
D. SUIM
Ans : SUIM
Q.4 Access to the application will be restricted to the users in_________.
A. Activity Level Access
B. Application Level Access
C. Access to data objects
D. None of the options
Ans : Application Level Access
Q.5 “Users to be allowed to view data for the US region but not Europe” is an example of __________.
A. Activity Level Access
B. Application Level Access
C. Access to functionalities for a region
D. Access to functionality within an application
Ans : Access to functionalities for a region
Q.6 “Access to read the purchase orders in the system, but the creation of new purchase orders not allowed” is an example of __________.
A. Activity Level Access
B. Application Level Access
C. Access to data objects
D. None of the options
Ans : Activity Level Access
Q.7 Security Hardware includes _________.
1. Firewalls
2. Spyware Detectors 3. Biometric Authentication
4. Hubs
5. Routers
A. 2, 5
B. 1, 5
C. 1, 2, 3
D. 4, 5
Ans : 1, 2, 3
Q.8 _________ are used to grant access to different users to different portions of data in the same view, depending on their business roles.
A. System Privileges
B. Analytic Privileges
C. Object Privileges
D. None of the options
Ans : Analytic Privileges
Q.9 ____________ are used to allow access to and modification of database objects, such as tables and views.
A. System Privileges
B. Analytic Privileges
C. Object Privileges
D. None of the options
Ans : Object Privileges
Q.10 _____________ is used to control the system administration tasks such as creating schemas, and managing users.
A. System Privileges
B. Analytic Privileges
C. Object Privileges
D. None of the options
Ans : System Privilege
Q.11 The SAP HANA Security role cycle is _________.
A. Role Modeler > Design Time & Runtime Roles > HANA Repository > User Admin
B. Role Modeler > HANA Repository > Design Time & Runtime Roles > User Admin
C. User Admin > Role Modeler > Design Time & Runtime Roles > HANA Repository
D. None of the options
Ans : Role Modeler > HANA Repository > Design Time & Runtime Roles > User Admin
Q.12 The mechanism for validating an identity is __________
A. Identity
B. Integrity
C. Authorization
D. Authentication
Ans : Authentication
Q.13 ____________ defines what a user can do in the SAP system.
A. Identity
B. Integrity
C. Authorization
D. Authentication
Ans : Authorization
Q.14 Authorization roles are defined based on job titles held by users across the organization in ___________.
A. Structural Authorization
B. General Authorization
C. Both the options
Ans : Structural Authorization
Q.15 Which of the following is a user administration activity?
A. Password Reset
B. Lock/Unlock accounts
C. Create/Amend user accounts
D. Maintenance of profiles
E. All the options
Ans : All the options
Q.16 The user type for background processing and communication within the system is ___________.
A. System User
B. Communication User
C. Dialogue User
D. None of the options
Ans : System User
Q.17 SAP system administrators are responsible for monitoring and maintaining the ongoing reliability, performance, management, and support of the SAP application.
A. True
B. False
Ans : True
Q.18 SAP roles such as SAP_ALL and SAP_NEW should be granted to any user.
A. True
B. False
Ans : False