You are on page 1of 5

Question1 of 20

Which t-code is used to globally deactivate the authorization


object:AUDIT_AUTH?A) AUTH_ENABLE_OBJECT
B) AUTH_DEACTIVE_OBJECT
C) AUTH_SWITCH_OBJECT
D) AUTH_DISABLE_OBJECT
Question2 of 20Which table is used display the possible activities for an auth
object?A) TACT
B) TACTZ
C) TSTCA
D) TSTCS

Question3 of 20In SAP Environment, Health and Safety Management ,


the Authorization object required to report an incident by Location isA)
EHHSS_INC1
B) EHHSS_INC3
C) EHHSS_INC5
D) EHHSS_INC2

Question4 of 20Which table stores the Developer Access key?


A) DEVACCESS
B) DEVC_APP
C) DEVC_APX
D) DEVL

Question5 of 20Which t-code is used to display CUA logs?


A) SCUL
B) SCUA

C) SCAT
D) SCA1

Question6 of 20which SAP table has CINFO field in it?


A) TSTC
B) TACT
C) TACTZ
D) TADIR

Question7 of 20HR Authorization Main Switches


are stored in which table in SAP?A) T77UA
B) T777S
C) T77PR
D) T77S0

Question8 of 20Tcode to Create an Organizational Model in SAP CRM isA)


PPOCA_CRM
B) PPOSA_CRM
C) PPOMA_CRM
D) COMMPR01

Question9 of 20Which of the following tools does NOT offer Goverance, Risk &
Compliance capabilities?A) SAP GRC
B) Security Weaver
C) SAP TAO
D) SAP CHECKAUD

Question10 of 20Which of the following is NOT a valid Plug -in for SAP GRC

10?A) GRCPIERP
B) GRCPINW
C) SLL - PI
D) GRCPIFDA

Question11 of 20Report used to regenerate Index for


Structural Authorization profiles for selected users in SAP HRA) RHBAUS02
B) RHBAUS00
C) RHBAUS01
D) RPUACG00

Question12 of 20Which is a mandatory field (selection criteria) in executing


the Critical authorization report?A) Variant Name
B) User
C) Role
D) User Group

Question13 of 20The standard authorization object __________ allows you


to use the trace tool environment (RSTT) in BW.A) RSTTBOBJ
B) S_RS_RSTT
C) S_RS_IOBJ
D) S_RS_INEW

Question14 of 20Table to store Illegal passwords in SAP isA) USR40


B) USR20
C) USR30
D) USR10

Question15 of 20Which t-code is used to globally deactivate the authorization


object:AUDIT_AUTH?A) AUTH_ENABLE_OBJECT
B) AUTH_DEACTIVE_OBJECT
C) AUTH_SWITCH_OBJECT
D) AUTH_DISABLE_OBJECT

Question16 of 20Using which t-code you can check if the CUA is


activated?A) SU01
B) SU10
C) PFCG
D) SUPC

Question17 of 20Which t-code is used to adjust the time zone in SAP


client?A) STZAC
B) STZAD
C) STZBC
D) STZBD

Question18 of 20How do you assign a security policy in SAP?


A) SU01
B) SUIM
C) PFCG
D) SUPC

Question19 of 20which SAP table has CINFO field in it?A) TSTC


B) TACT
C) TACTZ
D) TADIR

Question20 of 20Which table is used display the possible activities for an auth
object?A) TACT
B) TACTZ
C) TSTCA
D) TSTCS

You might also like