Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
ADM940 Flashcards

ADM940 Flashcards

Ratings:

5.0

(1)
|Views: 728 |Likes:
Published by seansran
These are personally prepared SAP 940 Certification Flashcards.
These are personally prepared SAP 940 Certification Flashcards.

More info:

Published by: seansran on May 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/11/2013

pdf

text

original

 
ADM940
 
 –
 
SAP
 
Security
 
consultant
 
certification
 
flashcards
 
 –
 
 julien.moix@gmail.com
 
1
 
What
 
is
 
Central
 
User
 
Administration
 
used
 
for?
 
A
 
To
 
administer
 
password
 
for
 
SAP
 
users
 
centrally
 
B
 
To
 
maintain
 
printer
 
landscapes
 
centrally
 
C
 
To
 
administer
 
user
 
master
 
records
 
centrally
 
D
 
To
 
create
 
authorization
 
profiles
 
centrally
 
Answer:
 
C
 
What
 
are
 
the
 
3
 
main
 
sources
 
of 
 
risks?
 
Persons
:
 
Important
 
employees
 
leaving
 
the
 
company,
 
dissatisfied
 
or
 
inexperienced
 
employees.
 
Hackers
 
with
 
criminal
 
intent.
 
Technology
:
 
Processing
 
errors
 
(caused
 
by
 
applications
 
or
 
operating
 
systems),
 
viruses,
 
power
 
supply
 
interruption
 
and
 
hardware
 
failure.
 
Environment
:
 
Fire,
 
flood,
 
dust,
 
earthquakes.
 
Measure
 
for
 
each
 
source
 
of 
 
risk.
 
(Person,
 
Technology,
 
Environment)
 
Organizational
 
Measures
:
 
Training,
 
internal
 
security
 
policy,
 
procedures,
 
roles,
 
responsibilities.
 
Technical
 
Measures
:
 
Inclusion
 
of 
 
electronics
 
for
 
checks
 
(routers).
 
Access
 
authorizations
 
for
 
systems
 
and
 
data.
 
Environmental
 
measures
 
protect
 
physical
 
system
 
components
 
against
 
natural
 
sources
 
of 
 
danger.
 
What
 
is
 
the
 
difference
 
between
 
System
 
Access
 
Control
 
and
 
Role
 
based
 
Access
 
control?
 
System
 
Access
 
Control
 
Users
 
must
 
identify
 
themselves
 
in
 
the
 
system
 
Configuration
 
of 
 
system
 
access
 
control
 
(such
 
as
 
pwd
 
rules)
 
Access
 
Control
 
Access
 
rights
 
for
 
functions
 
and
 
data
 
granted
 
explicitly
 
using
 
authorization
 
Authorization
 
checks
 
for
 
Transaction/reports
 
checks,
 
Program
 
execution
 
What
 
are
 
the
 
3
 
main
 
components
 
of 
 
a
 
SAP
 
role?
 
Role
 
Menu
:
 
Transaction,
 
Reports,
 
Weblinks
 
combined
 
in
 
a
 
Menu
 
Authorization
:
 
Access
 
right
 
for
 
business
 
function
 
and
 
data
 
User
:
 
Assignation
 
User
 
 –
 
Role
 
necessary.
 
With
 
profile
 
generator
 
or
 
with
 
SU01
 
 
ADM940
 
 –
 
SAP
 
Security
 
consultant
 
certification
 
flashcards
 
 –
 
 julien.moix@gmail.com
 
2
 
Report
 
that
 
display
 
all
 
the
 
role
 
templates
 
that
 
are
 
supplied
 
by
 
SAP
 
RSUSR070
 
What
 
are
 
the
 
5
 
steps
 
of 
 
the
 
ASAP
 
Methodology
?
 
Project
 
preparation
:
 
inclusion
 
of 
 
all
 
decision
 
maker
 
Business
 
blueprint
:
 
requirement
 
determination
 
Implementation
:
 
configuration
 
and
 
fine
 
tuning
 
Final
 
preparation
:
 
testing
 
and
 
training
 
Go
 
live
 
and
 
support
:
 
start
 
of 
 
production
 
What
 
are
 
the
 
5
 
steps
 
of 
 
the
 
authorization
 
concept
 
conception
?
 
Preparation
:
 
Set
 
up
 
a
 
team,
 
define
 
communication
 
process
 
Analysis
 
and
 
Conception
:
 
analyze
 
process
 
and
 
determine
 
role
 
framework
 
Implementation
:
 
Creation
 
of 
 
roles
 
Quality
 
assurance
 
and
 
Tests
:
 
positive
 
and
 
negative
 
testing
 
Cutover
:
 
production
 
start
 
What
 
are
 
the
 
main
 
components
 
of 
 
the
 
authorization
 
concept
?
 
Authorization
 
object
 
class
:
 
grouping
 
of 
 
authorization
 
object
 
Authorization
 
object
:
 
group
 
1
 
to
 
10
 
authorization
 
fields
 
Authorization
 
field
:
 
smallest
 
unit
 
checked
 
Authorization
:
 
Instance
 
of 
 
an
 
authorization
 
object
 
Authorization
 
profile
:
 
Group
 
of 
 
instances
 
(authorization)
 
Role
:
 
SAP
 
user
 
activities
 
description,
 
allow
 
automatic
 
generation
 
of 
 
profile
 
User
:
 
log
 
to
 
SAP
 
with
 
specific
 
access
 
How
 
should
 
be
 
the
 
naming
 
convention
 
for
 
new
 
developments?
 
Authorization
 
and
 
authorization
 
profiles
:
 
Do
 
not
 
start
 
with
 
Y,
 
Z,
 
must
 
not
 
contain
 
an
 
underscore
 
in
 
the
 
second
 
position
 
Authorization
 
classes,
 
object,
 
fields
 
are
 
development
 
object
 
and
 
must
 
start
 
with
 
Y
 
and
 
Z
 
 
ADM940
 
 –
 
SAP
 
Security
 
consultant
 
certification
 
flashcards
 
 –
 
 julien.moix@gmail.com
 
3
 
Table
 
for
 
all
 
possible
 
activities
 
TACT
 
What
 
are
 
the
 
2
 
checks
 
executed
 
after
 
a
 
transaction
 
start
 
to
 
ensure
 
that
 
the
 
user
 
has
 
the
 
appropriate
 
authorization?
 
Step
 
1:
 
Check
 
if 
 
the
 
user
 
is
 
authorized
 
to
 
start
 
the
 
transaction
 
Step
 
2:
 
Check
 
if 
 
an
 
authorization
 
object
 
is
 
assigned
 
to
 
the
 
transaction
 
code
 
Table
 
for
 
transaction
 
code
 
/
 
authorization
 
object
 
assignment
 
TSTCA
 
ABAP
 
object
 
used
 
to
 
check
 
the
 
authorization
 
object
 
assigned
 
to
 
the
 
transaction
 
Authority
check
 
Return
 
codes
 
after
 
the
 
authorization
 
check
 
with
 
the
 
ABAP
 
object
 
authority
check
 
0
:
 
The
 
user
 
has
 
the
 
authorization
 
for
 
the
 
object
 
and
 
the
 
fields
 
value
 
4
:
 
The
 
user
 
has
 
the
 
authorization
 
for
 
the
 
object,
 
but
 
not
 
for
 
filed
 
value
 
12
:
 
The
 
user
 
has
 
no
 
authorization
 
16
:
 
No
 
profile
 
is
 
entered
 
in
 
the
 
user
 
master
 
record
 

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Manish Zaveri liked this
Manish Zaveri liked this
ravi.m.reddy715 liked this
avasu9 liked this
jedidink liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->