---Advertisement---
Authorization Concepts Overview SAP SAP S4HANA

SAP S/4HANA Authorization Concepts Overview Interview Question-Answer

By smart_answer13

Updated on:

---Advertisement---

Q.1 ____________ is used to verify that security standards/policies/procedures are followed and exceptions are noted.

       A. Authorization

       B. Authentication

       C. Identity

       D. Security Monitoring

Ans : Security Monitoring


Q.2 _________ is the unique set of attributes a user has in the SAP system.

       A. Authentication

       B. Integrity

       C. Authorization

       D. Identity

Ans : Identity


Q.3 For maintaining strict standards of security compliance, the _________ transaction is extremely important.

       A. UISM

       B. MUIS

       C. SUM

       D. SUIM

Ans : SUIM


Q.4 Access to the application will be restricted to the users in_________.

       A. Activity Level Access

       B. Application Level Access

       C. Access to data objects

       D. None of the options

Ans : Application Level Access


Q.5 “Users to be allowed to view data for the US region but not Europe” is an example of __________.

       A. Activity Level Access

       B. Application Level Access

       C. Access to functionalities for a region

       D. Access to functionality within an application

Ans : Access to functionalities for a region


Q.6 “Access to read the purchase orders in the system, but the creation of new purchase orders not allowed” is an example of __________.

       A. Activity Level Access

       B. Application Level Access

       C. Access to data objects

       D. None of the options

Ans : Activity Level Access


Q.7 Security Hardware includes _________.
1. Firewalls
2. Spyware Detectors 3. Biometric Authentication
4. Hubs
5. Routers

       A. 2, 5

       B. 1, 5

       C. 1, 2, 3

       D. 4, 5

Ans : 1, 2, 3


Q.8 _________ are used to grant access to different users to different portions of data in the same view, depending on their business roles.

       A. System Privileges

       B. Analytic Privileges

       C. Object Privileges

       D. None of the options

Ans : Analytic Privileges


Q.9 ____________ are used to allow access to and modification of database objects, such as tables and views.

       A. System Privileges

       B. Analytic Privileges

       C. Object Privileges

       D. None of the options

Ans : Object Privileges


Q.10 _____________ is used to control the system administration tasks such as creating schemas, and managing users.

       A. System Privileges

       B. Analytic Privileges

       C. Object Privileges

       D. None of the options

Ans : System Privilege


Q.11 The SAP HANA Security role cycle is _________.

       A. Role Modeler > Design Time & Runtime Roles > HANA Repository > User Admin

       B. Role Modeler > HANA Repository > Design Time & Runtime Roles > User Admin

       C. User Admin > Role Modeler > Design Time & Runtime Roles > HANA Repository

       D. None of the options

Ans : Role Modeler > HANA Repository > Design Time & Runtime Roles > User Admin


Q.12 The mechanism for validating an identity is __________

       A. Identity

       B. Integrity

       C. Authorization

       D. Authentication

Ans : Authentication


Q.13 ____________ defines what a user can do in the SAP system.

       A. Identity

       B. Integrity

       C. Authorization

       D. Authentication

Ans : Authorization


Q.14 Authorization roles are defined based on job titles held by users across the organization in ___________.

       A. Structural Authorization

       B. General Authorization

       C. Both the options

Ans : Structural Authorization


Q.15 Which of the following is a user administration activity?

       A. Password Reset

       B. Lock/Unlock accounts

       C. Create/Amend user accounts

       D. Maintenance of profiles

       E. All the options

Ans : All the options


Q.16 The user type for background processing and communication within the system is ___________.

       A. System User

       B. Communication User

       C. Dialogue User

       D. None of the options

Ans : System User


Q.17 SAP system administrators are responsible for monitoring and maintaining the ongoing reliability, performance, management, and support of the SAP application.

       A. True

       B. False

Ans : True


Q.18 SAP roles such as SAP_ALL and SAP_NEW should be granted to any user.

       A. True

       B. False

Ans : False


smart_answer13

---Advertisement---

Related Post

SAP S/4HANA Enterprise Management – Finance Interview Question-Answer

Q.1 Portfolio Analyser is used to calculate and monitor the rate of return on ________________.        A. Intangible assets        B. Financial assets   ...

SAP S/4HANA : Central Finance Interview Question-Answer

Q.1 Select the options for deployment of SAP Central Finance        A. Public cloud        B. Private cloud        C. On-premise   ...

SAP S/4HANA : ‘Plan to Maintain’ Interview Question-Answer

Q.1 EAM Stands for _______.        A. Enterprise Analytics Management        B. Enterprise Acquisition Management        C. Enterprise Asset Management     ...

SAP ABAP Data Dictionary Interview Question-Answer

Q.1 Data Element can point to        A. cannot point to any domain        B. 3 domains        C. multiple domains   ...

Leave a Comment