This page was exported from Free Exam Dumps Collection [ http://free.examcollectionpass.com ] Export date:Thu Nov 28 2:41:46 2024 / +0000 GMT ___________________________________________________ Title: SAP P_SECAUTH_21 Exam Questions (Updated 2022) 100% Real Question Answers [Q30-Q49] --------------------------------------------------- SAP P_SECAUTH_21 Exam Questions (Updated 2022) 100% Real Question Answers Pass SAP P_SECAUTH_21 Exam Quickly With ExamcollectionPass NEW QUESTION 30What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.  They are used for user-to-system trusted login  They are used for system-to-system communication  They have an unconfigurable validity of 2 minutes  They are transmitted as cookies NEW QUESTION 31What is the User Management Engine (UME) property “connect on pooling” used for? Note: There are 2 correct answers to this question.  To improve performance of requests to the LDAP directory server  To avoid unauthorized request to the LDAP directory server  To create a new connect on to the LDAP directory server for each request  To share server resources among requesting LDAP clients NEW QUESTION 32SNC is configured in the production system. For emergency purposes, you want to allow certain accounts to be able to access the system with password logon. What do you need to set up for this purpose? Note: There are 2 correct answers to this question.  Use profile parameter SNC/ACCEPT_ INSECURE_GUI with value ‘U’  Use profile parameter SNC/ONLY_ENCRYPTED_GUI with value ‘O’  Maintain the user access control list in table USRACLEXT  Use the ‘Unsecure communication permitted option’ In SU01 for specific users NEW QUESTION 33What authorization objects do we need to create job steps with external commands in a background job? Note: There are 2 correct answers to this question.  S_ADMI_FCD  S_LOG_COM  S_RZL_ADM  S_BTCH_EXT NEW QUESTION 34For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA system? Note: There are 2 correct answers to this question.  To protect the password of the root key backup  To store root keys for data volume encryption  To store the secure single sign-on configuration  To protect the X.509 public key infrastructure certificates NEW QUESTION 35What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.  Configuration check of the SAP systems and the SAP middleware components against defined configurations  Results with recommendations on how to resolve identified vulnerabilities without prioritization  Analysis of security vulnerabilities within an enterprise’s SAP landscape to ensure optimal protection against intrusions  Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability NEW QUESTION 36You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.  Authenticates the user’s credentials  Uses SAP logon groups to determine which requests are directed to which server  Checks current state of the message server  Decrypts the HTTPS request and then selects the server NEW QUESTION 37You want to use Configuration Validation functionality in SAP Solution Manager to check the consistency of settings across your SAP environment. What serves as the reference basis for Configuration Validation? Note: There are 2 correct answers to this question.  A list of recommended settings attached to a specific SAP Note  A target system in your system landscape  A virtual set of manually maintained configuration ems  A result list of configuration items from SAP Early Watch Alert (EWA) NEW QUESTION 38You have delimited a single role which is part of a composite role, and a user comparison for the composite role has been performed. You notice that the comparison did NOT remove the profile assignments for that single role. What program would you run to resolve this situation?  0 PRGN_COMPRESS_TIMES  0PRGN_COMPARE_ROLE_MENU  0 PRGN_DELETE_ACT IVITY_GROUPS  0 PRGN_MERGE_PREVIEW NEW QUESTION 39In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction.How do you prevent the access of users to the transaction A from within the program?  Make sure you do NOT assign transact on A to the authorization object S_TCODE in the role that you assign to the unauthorized users.  Maintain SE93 with authorization objects for transact on A.  Maintain the check indicator in table TCDCOUPLES  Ensure that transact on A is NOT assigned into the same program authorization group NEW QUESTION 40You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SAP NetWeaver AS systems (hostl.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server’s PSE?  It should be a combined DNS alias for host 1.mydomain.com and host2.mydomain.com and nat1.mydomain.com  It should be host 1.mydomain.com, host2.mydornain.com individually for each PSE  It should be natl.mydomain.com  It should be *.mydomain.com (wildcard) names NEW QUESTION 41You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations?  By using the statement AUTHORITY-CHECK in the access control of the CDS view  By defining access conditions in an access rule for the CDS view  By assigning the CDS view to the authorization profile in PFCG  By defining the CDS view in the authorization object in SU21 NEW QUESTION 42A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12. What does the Return Code 12 signify?  “Objects not contained in User Buffer”  “No authorizations and does NOT have authorization object in their buffer”  “No authorizations but does have authorization object in their buffer”  “Too many parameters for authorization checks” NEW QUESTION 43Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web Administration interface? Note: There are 2 correct answers to this question.  Use a separate port for the content  Use access restrictions with the icm/HTTP/auth_<xx> profile parameter  Use subparameter ALLOWPUB = FALSE of the profile parameter icm/server_port_<xx>  Use Secure Socket Layer (SSL) for password encrypt on NEW QUESTION 44What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?  S_PROGRAM  S_START  S_TCODE  S_SERVICE NEW QUESTION 45What are characteristics only valid for the MDC high isolation mode?  Every tenant has its own set of OS users  All internal database communication is secured using SNC  Every tenant has its own set of database users  Every tenant has its own set of database users belonging to the same sapsys group NEW QUESTION 46You want to carry out some preparatory work for executing the SAP Security Optimization Self-service on a customer system. Which of the following steps do you have to execute on the managed systems? Note: There are 2 correct answers to this question.  Install the ST-A/PI plug-in  Configure Secure Network Communications  Configure specific authorizations  Grant operating system access NEW QUESTION 47You are running an SAP HANA database in a multi database container (MDC) mode with a single tenant configured. The global_auditing_state parameter has been set to “true” on the global.ini.After restarting the system and tenant databases, the tenant did not come up. When checking the cause, it was discovered that a tenant configuration parameter has been changed. The audit logging did NOT show any events.What could be the reason for this? Note: There are 2 correct answers to this question.  The system was offline when the changes were done  The audit level was set to INFO  The global_auditing_state parameter on the nameserver.ini file needs to be activated  The configuration parameter was changed from the OS level NEW QUESTION 48Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?  XML  Plain text  0csv  SAP compressed NEW QUESTION 49Which OData authorizations are required for a user to see business data in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.  Start authorization in the SAP Fiori front-end system  Access authorization in the SAP Fiori front-end system  Access authorization in the SAP S/4HANA back-end system  Start authorization in the SAP S/4HANA back-end system  Loading … Real SAP P_SECAUTH_21 Exam Questions [Updated 2022]: https://www.examcollectionpass.com/SAP/P_SECAUTH_21-practice-exam-dumps.html --------------------------------------------------- Images: https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-10 10:52:14 Post date GMT: 2022-06-10 10:52:14 Post modified date: 2022-06-10 10:52:14 Post modified date GMT: 2022-06-10 10:52:14