This page was exported from IT certification exam materials [ http://blog.dumpleader.com ] Export date:Mon Feb 24 14:16:29 2025 / +0000 GMT ___________________________________________________ Title: Latest [Dec 01, 2022] P-SECAUTH-21 Exam Dumps - Valid and Updated Dumps [Q18-Q41] --------------------------------------------------- Latest [Dec 01, 2022] P-SECAUTH-21 Exam Dumps - Valid and Updated Dumps Free Sales Ending Soon - 100% Valid P-SECAUTH-21 Exam Dumps with 81 Questions P-SECAUTH-21 Exam Certification Details: Cut Score:66%Exam:80 questionsLanguages:EnglishSample Questions: SAP P-SECAUTH-21 Exam Sample Question Duration:180 minsLevel:Professional   NO.18 You are setting up your SAP NetWeaver AS in a SSL client scenario. What are the reasons to choose an “anonymous SSL Client PSE” setup?Note: There are 2 correct answers to this question.  To support mutual authentication  To support server-side authentication and data encryption  To use as a container for the list of CAs that the server trusts  To have an individual identity when accessing a specific application NO.19 What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.  Configuration check of the SAP systems and the SAP middleware components against defined configurations  Results with recommendations on how to resolve identified vulnerabilities without prioritization  Analysis of security vulnerabilities within an enterprise’s SAP landscape to ensure optimal protection against intrusions  Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability NO.20 You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?  Maintain a Firefighter ID for Controllers and FirefightersMaintain an Owner for a Firefighter IDMaintain Access Control Owner  Maintain an Owner for a Firefighter IDMaintain a Firefighter ID for Controllers and FirefightersMaintain Access Control Owner  Maintain an Owner for a Firefighter IDMaintain a Firefighter ID for Controllers and FirefightersMaintain Access Control Owner  Maintain an Owner for a Firefighter IDMaintain a Firefighter ID for Controllers and FirefightersMaintain Access Control Owner NO.21 You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations?  By using the statement AUTHORITY-CHECK in the access control of the CDS view  By defining access conditions in an access rule for the CDS view  By assigning the CDS view to the authorization profile in PFCG  By defining the CDS view in the authorization object in SU21 NO.22 Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?  XML  Plain text  0csv  SAP compressed NO.23 How would you control access to the ABAP RFC function modules? Note: There are 2 correct answers to this question.  O Block RFC Callback Whitelists  O Restrict RFC authorizations  O Deactivate switchable authorization checks  O Implement UCON functionality NO.24 What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note: There are 3 correct answers to this question.  The default values so they are appropriate for the transactions used in the roles  The authorization objects that are not linked to transact on codes correctly  The default values in the tables USOBX and USOBT  The default authority check settings for the role maintenance tool  The authorization objects that have unacceptable default values NO.25 The SSO authentication using X.509 client certificates is configured. Users complain that they can’t log in to the back-end system. The trace file shows the following error message: “HTTP request [2/5/9] Reject untrusted forwarded certificate”. What is missing in the configuration? Note: There are 2 correct answers to this question.  On the back-end, the profile parameter icm/HTTPS/verify client must NOT be set to 0  On the web-dispatcher, the SAPSSLS.pse must be signed by a trusted certification authority  On the web-dispatcher, the profile parameter icm/HTTPS/verify_client must be set to 0  The web dispatcher’s SAPSSLC.PSE certificate must be added to the trusted reverse proxies list in icm/trusted_reverse_proxy_<xx> NO.26 For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA system? Note: There are 2 correct answers to this question.  To protect the password of the root key backup  To store root keys for data volume encryption  To store the secure single sign-on configuration  To protect the X.509 public key infrastructure certificates NO.27 You are consolidating user measurement results and transferring them to SAP. What act on do you take?  Run report RSUSR200  Run report RFAUDI06_BCE  Run report RSLAW_PLUGIN  Run transact on USMM NO.28 What is the SAP Best Practice to delete a security SAP role in SAP landscape?  Transport the SAP role and delete the role using Profile Generator  Delete the SAP role in all clients using Profile Generator  Delete the SAP role using Profile Generator, and then put it in the transport  Delete the SAP role in all clients in all systems using Profile Generator NO.29 What is the User Management Engine (UME) property “connect on pooling” used for? Note: There are 2 correct answers to this question.  To improve performance of requests to the LDAP directory server  To avoid unauthorized request to the LDAP directory server  To create a new connect on to the LDAP directory server for each request  To share server resources among requesting LDAP clients NO.30 To prevent session fixation and session hijacking attacks, SAP’s HTTP security session management is highly recommended. What are the characteristics of HTTP security session management? Note: There are 2 correct answers to this question.  It uses URLs containing sap-context d to identify the security session  The system is checking the logon credentials again for every request  The security sessions are created during logon and deleted during logoff.  The session identifier is a reference to the session context transmitted through a cookie. NO.31 Why do you use table logging in AS ABAP?  To log changes in application data  To log changes in master data  To log changes in table technical settings  To log changes in customizing tables NO.32 The SAP HANA database has its parameters configured with its default values. How can the SAP_INTERNAL_HA NA_SUPPORT catalog role be used?  The role can be granted to another role (nested)  The role can be granted to multiple users at a time  The role can be granted only with system privileges  The role can be granted to the SYSTEM user NO.33 A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping. At what level are you going to check the target mapping?  O At the catalog level in the SAP Fiori front-end server  O At the group level in the SAP Fiori front-end server  O At the group level in the SAP Fiori Launchpad  O At the application level in the Web IDE NO.34 How do you handle user “SAP ‘in AS ABAP? Note: There are 3 correct answers to this question.  Remove all authorizations from the user  Lock and expire the user in all clients  Set profile parameter login/no_automatic_user_sapstar to 0  Set profile parameter login/no_automatic_user_sapstar to 1  Lock and expire the user in all clients except 000 NO.35 Because of which security threat would you need to make additional configuration settings to run the SAP Fiori Launchpad from within your SAP NetWeaver Portal?  Cross-Site Request Forgery  Clickjacking  Content Spoofing  Cross-Site Scripting NO.36 Which OData authorizations are required for a user to see business data in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.  Start authorization in the SAP Fiori front-end system  Access authorization in the SAP Fiori front-end system  Access authorization in the SAP S/4HANA back-end system  Start authorization in the SAP S/4HANA back-end system NO.37 Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Process (MSMP) initiator workflow?  Function ID  Application ID  Process ID  Expression ID NO.38 Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?  S_RFCACL  S_RFC  S_SERVICE  S_ ICM NO.39 What authorization objects do we need to create job steps with external commands in a background job? Note: There are 2 correct answers to this question.  S_ADMI_FCD  S_LOG_COM  S_RZL_ADM  S_BTCH_EXT NO.40 You are running a 3-tier SAP system landscape. Each time you are accessing STMS_IMPORT on any of these systems, you are prompted for a TMSADM password. How can you stop this prompt from appearing?  Run the report RSUSR405 on the domain controller.  Reset the TMSADM user’s password on the system you are trying to access STMS_ IMPORT.  Change the TMSA DM user’s password directly in the TMS RFC destination in transact on SM59.  Run the report TMS_ UPDATE_PWD_OF_TMSADM on the domain controller. NO.41 What reference is used to connect multiple Cloud Connectors to one SAP Cloud Platform subaccount?  System Alias  Location ID  Instance ID  Virtual Host  Loading … SAP P-SECAUTH-21 Exam Description: The "SAP Certified Technology Professional - System Security Architect" certification exam verifies that the candidate possesses the depth of knowledge required in the areas of SAP System Security and Authorization. This certificate proves that the candidate has an advanced understanding within the Technology Consultant profile and is able to apply these skills practically and provide guidance in SAP project implementations in the role of a SAP Security Architect. Furthermore, the holder of this certification is capable to review and evaluate the security level of complex on-premise, cloud and hybrid system architectures.   P-SECAUTH-21 Exam Dumps - 100% Marks In P-SECAUTH-21 Exam: https://www.dumpleader.com/P-SECAUTH-21_exam.html --------------------------------------------------- Images: https://blog.dumpleader.com/wp-content/plugins/watu/loading.gif https://blog.dumpleader.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-12-01 10:03:37 Post date GMT: 2022-12-01 10:03:37 Post modified date: 2022-12-01 10:03:37 Post modified date GMT: 2022-12-01 10:03:37