This page was exported from IT certification exam materials [ http://blog.dumpleader.com ] Export date:Fri Jan 31 13:43:08 2025 / +0000 GMT ___________________________________________________ Title: [Oct 18, 2022] Powerful P_SECAUTH_21 PDF Dumps for P_SECAUTH_21 Questions [Q35-Q58] --------------------------------------------------- [Oct 18, 2022] Powerful P_SECAUTH_21 PDF Dumps for P_SECAUTH_21 Questions Authentic P_SECAUTH_21 Dumps - Free PDF Questions to Pass P_SECAUTH_21 Exam Certification Details: Exam:80 questionsSample Questions: SAP P_SECAUTH_21 Exam Sample Question Level:ProfessionalCut Score:66%Languages:English SAP P_SECAUTH_21 Exam Description: The "SAP Certified Technology Professional - System Security Architect" certification exam verifies that the candidate possesses the depth of knowledge required in the areas of SAP System Security and Authorization. This certificate proves that the candidate has an advanced understanding within the Technology Consultant profile and is able to apply these skills practically and provide guidance in SAP project implementations in the role of a SAP Security Architect. Furthermore, the holder of this certification is capable to review and evaluate the security level of complex on-premise, cloud and hybrid system architectures.   NEW QUESTION 35How would you control access to the ABAP RFC function modules? Note: There are 2 correct answers to this question.  O Block RFC Callback Whitelists  O Restrict RFC authorizations  O Deactivate switchable authorization checks  O Implement UCON functionality NEW QUESTION 36You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations?  By using the statement AUTHORITY-CHECK in the access control of the CDS view  By defining access conditions in an access rule for the CDS view  By assigning the CDS view to the authorization profile in PFCG  By defining the CDS view in the authorization object in SU21 NEW QUESTION 37You are running a 3-tier SAP system landscape. Each time you are accessing STMS_IMPORT on any of these systems, you are prompted for a TMSADM password. How can you stop this prompt from appearing?  Run the report RSUSR405 on the domain controller.  Reset the TMSADM user’s password on the system you are trying to access STMS_ IMPORT.  Change the TMSA DM user’s password directly in the TMS RFC destination in transact on SM59.  Run the report TMS_ UPDATE_PWD_OF_TMSADM on the domain controller. NEW QUESTION 38The SAP HANA database has its parameters configured with its default values. How can the SAP_INTERNAL_HA NA_SUPPORT catalog role be used?  The role can be granted to another role (nested)  The role can be granted to multiple users at a time  The role can be granted only with system privileges  The role can be granted to the SYSTEM user NEW QUESTION 39What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.  Synchronization of user contexts from ABAP Systems  Predictive threat notification  Pseudonymize user identities for data protection  Baseline detection NEW QUESTION 40You are running an SAP HANA database in a multi database container (MDC) mode with a single tenant configured. The global_auditing_state parameter has been set to “true” on the global.ini.After restarting the system and tenant databases, the tenant did not come up. When checking the cause, it was discovered that a tenant configuration parameter has been changed. The audit logging did NOT show any events.What could be the reason for this? Note: There are 2 correct answers to this question.  The system was offline when the changes were done  The audit level was set to INFO  The global_auditing_state parameter on the nameserver.ini file needs to be activated  The configuration parameter was changed from the OS level NEW QUESTION 41Which OData authorizations are required for a user to see business data in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.  Start authorization in the SAP Fiori front-end system  Access authorization in the SAP Fiori front-end system  Access authorization in the SAP S/4HANA back-end system  Start authorization in the SAP S/4HANA back-end system NEW QUESTION 42A system user created a User1 and a schema on the HANA database with some dat a. User2 is developing modelling views and requires access to objects in User1’s schema. What needs to be done?  User1 should grant _SYS_REPO with SELECT WITH GRANT privilege  User2 needs to be granted with the same roles like User1  System user should grant User2 with SELECT privilege to User 1schema  ROLE ADMIN needs to be granted to User2 NEW QUESTION 43When re-configuring the user management engine (UME) of an AS Java system, what do you need to consider to change the data source from system database to an ABAP system successfully?  The logon security policy for the existing users is aligned with the logon security policy in the ABAP system.  All users and groups in the system database must have different IDs than existing users and groups in the ABAP system.  You need to import the users from the system database into the ABAP system.  You must manually replace the UME configuration file dataSourceConfiguration_database_only.xmlwith an appropriate dataSourceConfiguration_abap.xmlfile. NEW QUESTION 44You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Which of the following scenarios do you choose?  Chrome, SAP Enterprise Portal, SAP GUI for Java  Chrome, SAP Cloud Platform, SAP GUI for Java  Internet Explorer, ABAP front-end server, SAP GUI for Windows  Internet Explorer, SAP Business Client, SAP GUI for Windows NEW QUESTION 45How do you check when and by whom profiles were assigned or deleted?  Run report RSUSR008_009_NEW with appropriate filters  Run report RSUSR100 with appropriate filters  Check system trace using transaction ST01  Check security audit log using transact on SM20 NEW QUESTION 46What is the User Management Engine (UME) property “connect on pooling” used for? Note: There are 2 correct answers to this question.  To improve performance of requests to the LDAP directory server  To avoid unauthorized request to the LDAP directory server  To create a new connect on to the LDAP directory server for each request  To share server resources among requesting LDAP clients NEW QUESTION 47Your company is running SAP S/4HANA on premise, with the requirement to run the SAP Fiori Launchpad in the SAP Cloud Platform. What would be the recommended scenario for user authentication for internet browser access to the SAP Fiori Launchpad?  SAML2 and OData Provisioning  SAP Logon Tickets  Principal Propagation  X.509 Client Certificates NEW QUESTION 48SNC is configured in the production system. For emergency purposes, you want to allow certain accounts to be able to access the system with password logon. What do you need to set up for this purpose? Note: There are 2 correct answers to this question.  Use profile parameter SNC/ACCEPT_ INSECURE_GUI with value ‘U’  Use profile parameter SNC/ONLY_ENCRYPTED_GUI with value ‘O’  Maintain the user access control list in table USRACLEXT  Use the ‘Unsecure communication permitted option’ In SU01 for specific users NEW QUESTION 49Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?  XML  Plain text  0csv  SAP compressed NEW QUESTION 50You are setting up your SAP NetWeaver AS in a SSL client scenario. What are the reasons to choose an “anonymous SSL Client PSE” setup?Note: There are 2 correct answers to this question.  To support mutual authentication  To support server-side authentication and data encryption  To use as a container for the list of CAs that the server trusts  To have an individual identity when accessing a specific application NEW QUESTION 51In addition to the authorization /UI2/LAUNCHPAD, which other authorizations are required to assign to an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question.  /U12/INTEROP  /UI2JPAGE_BUILDER_CUST  /UI2/FLC  /U12JPAGE_BUILDER_PERS NEW QUESTION 52A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping. At what level are you going to check the target mapping?  O At the catalog level in the SAP Fiori front-end server  O At the group level in the SAP Fiori front-end server  O At the group level in the SAP Fiori Launchpad  O At the application level in the Web IDE NEW QUESTION 53In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction.How do you prevent the access of users to the transaction A from within the program?  Make sure you do NOT assign transact on A to the authorization object S_TCODE in the role that you assign to the unauthorized users.  Maintain SE93 with authorization objects for transact on A.  Maintain the check indicator in table TCDCOUPLES  Ensure that transact on A is NOT assigned into the same program authorization group NEW QUESTION 54You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.  Authenticates the user’s credentials  Uses SAP logon groups to determine which requests are directed to which server  Checks current state of the message server  Decrypts the HTTPS request and then selects the server NEW QUESTION 55What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.  Configuration check of the SAP systems and the SAP middleware components against defined configurations  Results with recommendations on how to resolve identified vulnerabilities without prioritization  Analysis of security vulnerabilities within an enterprise’s SAP landscape to ensure optimal protection against intrusions  Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability NEW QUESTION 56You are evaluating the “Cross-client object change” option using transact on SCC4 for your Unit Test Client in the development environment. Which setting do you recommend?  Changes to repository and cross-client customizing allowed  No changes to repository and cross-client customizing objects  No changes to cross-client customizing objects  No changes to repository objects NEW QUESTION 57You want to use Configuration Validation functionality in SAP Solution Manager to check the consistency of settings across your SAP environment. What serves as the reference basis for Configuration Validation? Note: There are 2 correct answers to this question.  A list of recommended settings attached to a specific SAP Note  A target system in your system landscape  A virtual set of manually maintained configuration ems  A result list of configuration items from SAP Early Watch Alert (EWA) NEW QUESTION 58What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.  They are used for user-to-system trusted login  They are used for system-to-system communication  They have an unconfigurable validity of 2 minutes  They are transmitted as cookies  Loading … SAP P_SECAUTH_21 Exam Syllabus Topics: TopicDetailsTopic 1Explain how to secure an SAP system and conduct security checks Explain security and scenarios in SAP Cloud platformTopic 2Monitor security and troubleshoot security issues using Solution Manager Describe and implement the authorization concept for SAP S4HANATopic 3User Administration and Identity Lifecycle Management in SAP Explain authorization, security and scenarios in SAP HANATopic 4Authorization Concept for SAP Business Suite Security Monitoring and Security AuditingTopic 5Describe and implement the authorization concept for SAP Business Suite SAP Netweaver Application Server and Infrastructure SecurityTopic 6Describe the security goals, data privacy goverance Authorization, Security and Scenarios in SAP HANATopic 7Access Governance and Compliance in SAP SAP Cloud Platform Security Secure an SAP System   Guaranteed Accomplishment with Newest Oct-2022 FREE: https://www.dumpleader.com/P_SECAUTH_21_exam.html --------------------------------------------------- Images: https://blog.dumpleader.com/wp-content/plugins/watu/loading.gif https://blog.dumpleader.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-10-18 12:14:52 Post date GMT: 2022-10-18 12:14:52 Post modified date: 2022-10-18 12:14:52 Post modified date GMT: 2022-10-18 12:14:52