Which of the following statements regarding role maintenance are true? Note: There are 3 correct
answers to this question.
A. The "Expert Mode for Profile Generation" allows you to delete and recreate the profile and
authorizations for the corresponding role.
B. You can assign roles to organizational units instead of users.
C. Under "Reference Roles", you can define values for organizational levels.
D. You can delete authorization objects only if you deactivate them beforehand.
E. You can add reports and BSP (Business Server Page) applications to the menu of composite roles
manually.
正解:A,B,D
質問 2:
Which of the following statements regarding the authority-check are true? Note: There are 2 correct
answers to this question.
A. The authorization object: S_TCODE is checked by the kernel and not by the function module:
authority-check.
B. To find out if authority-checks were deactivated, you can compare table USOBX with the
corresponding customer table.
C. If you set the profile parameter: auth/object_disabling_active to "Y" you deactivate authorization checks
globally.
D. The authority-check as part of the ABAP source code cannot be deactivated without changing the
program.
正解:A,B
質問 3:
Which of the following statements about derived roles are true? Note: There are 2 correct answers to this
question.
A. The inherited menus cannot be changed in the derived roles.
B. The derived role inherits the user assignment from the reference role.
C. A derived role can refer to several reference roles.
D. If you generate derived roles from the reference role, the data for the organizational levels is only
transferred after the authorization data for the derived role is modified.
正解:A,D
質問 4:
Which of the following application ports are relevant for firewall settings for an AS ABAP+Java installation
with instance number: 18?
Note: There are 3 correct answers to this question.
A. The SAP WebDispatcher needs the predefined port: 5018.
B. The Visual Administrator needs the predefined port: 51804.
C. For deployment of WebDynpros (Java) the SDM (Software Deployment Manager) needs the
predefined port: 51818.
D. The Config Tool does not need any port since it can only be accessed through the host operating
system of the central instance.
E. The ICM (Internet Communication Manager) needs the predefined port: 1818.
正解:B,C,D
質問 5:
When is it acceptable not to take action on an identified risk?
A. When political issues prevent this type of risk from being addressed.
B. When the cost of the countermeasure outweighs the value of the asset and the potential loss.
C. Never. Good security has to address and reduce all risks.
D. When the necessary countermeasure is too complex.
正解:B
質問 6:
Which of the following authentication mechanisms are available for SAP NetWeaver AS Java?
Note: There are 3 correct answers to this question.
A. Web Dynpro for Single Sign-On
B. SAP Logon Tickets for Single Sign-On
C. Security session IDs for Single Sign-On between applications
D. Kerberos Authentication for Single Sign-On
E. SAML Assertions for Single Sign-On
正解:B,C,E
質問 7:
Which of the following statements regarding Change Documents in SAP Systems is correct?
A. SAP Systems do not automatically use change documents for business objects. You have to activate
the change document for the object using transaction SCD0.
B. Business data objects are changed frequently. Change documents are automatically used for business
objects in SAP Systems.
C. SAP Systems do not automatically use change documents for business objects. To be able to activate
a change document for an object, you have to insert the appropriate calls in the corresponding programs.
正解:C
質問 8:
When using CUA (Central User Administration), which option should be assigned to all system users?
A. Communication (CPIC in older releases)
B. Dialog
C. System
D. Service
E. Reference
正解:A
Sakurai -
大のPass4Testすすめです。ここに問題集を買うのは三度目になります。またお世話になりました。P_ADMSEC_731に合格しましたのでここで報告と感謝差し上げます