Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following P_SECAUTH_21 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

P_SECAUTH_21 SAP Certified Technology Professional - System Security Architect Questions and Answers

Questions 4

Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?

Options:

A.

XML

B.

Plain text

C.

0csv

D.

SAP compressed

Buy Now
Questions 5

Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this question

Options:

A.

NNTP

B.

LDAP

C.

SNA

D.

RFC

Buy Now
Questions 6

In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program?

Options:

A.

Make sure you do NOT assign transact on A to the authorization object S_TCODE in the role that you assign to the unauthorized users.

B.

Maintain SE93 with authorization objects for transact on A.

C.

Maintain the check indicator in table TCDCOUPLES

D.

Ensure that transact on A is NOT assigned into the same program authorization group

Buy Now
Questions 7

Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question

Options:

A.

/UI2/INTEROP

B.

/UI2/CHIP

C.

/UI2/PAGE_BUILDER_PERS

D.

/UI2/PAGE_BUILDER_CUST

Buy Now
Questions 8

Where can you store Security Audit Log Events? Note: There are 2 correct answers to this question.

Options:

A.

In the kernel trace

B.

In the database table RSAU_BUF_DATA

C.

Ip the file system of the application servers

D.

In the Linux system log

Buy Now
Questions 9

Why do you use table logging in AS ABAP?

Options:

A.

To log changes in application data

B.

To log changes in master data

C.

To log changes in table technical settings

D.

To log changes in customizing tables

Buy Now
Questions 10

How do you check when and by whom profiles were assigned or deleted?

Options:

A.

Run report RSUSR008_009_NEW with appropriate filters

B.

Run report RSUSR100 with appropriate filters

C.

Check system trace using transaction ST01

D.

Check security audit log using transact on SM20

Buy Now
Questions 11

What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question

Options:

A.

The Logon ticket is not domain restricted

B.

The Logon ticket session is held in the working memory

C.

The Logon ticket is sued for user-to-system communication

D.

The Logon ticket is always set to client 000

Buy Now
Questions 12

What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note: There are 3 correct answers to this question.

Options:

A.

The default values so they are appropriate for the transactions used in the roles

B.

The authorization objects that are not linked to transact on codes correctly

C.

The default values in the tables USOBX and USOBT

D.

The default authority check settings for the role maintenance tool

E.

The authorization objects that have unacceptable default values

Buy Now
Questions 13

You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SAP NetWeaver AS systems (hostl.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server's PSE?

Options:

A.

It should be a combined DNS alias for host 1.mydomain.com and host2.mydomain.com and nat1.mydomain.com

B.

It should be host 1.mydomain.com, host2.mydornain.com individually for each PSE

C.

It should be natl.mydomain.com

D.

It should be •.mydomain.com (wildcard) names

Buy Now
Questions 14

Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?

Options:

A.

S_RFCACL

B.

S_RFC

C.

S_SERVICE

D.

S_ ICM

Buy Now
Questions 15

Which authorization object is required to support trusted system access by an RFC user following the configuration of a Managed System in SAP Solution Manager?

Options:

A.

S_RFCACL

B.

S_ACL_HIST

C.

S_RFC_TT

D.

S_RFC_TTAC

Buy Now
Questions 16

How can you describe the hierarchical relationships between technical entities in the Cloud Foundry?

Options:

A.

A global account can have one or many subaccounts

B.

A SaaS tenant acts as one provider account.

C.

A SaaS tenant acts as one Cloud Foundry Organization.

D.

A subscription is a PaaS tenant.

Buy Now
Questions 17

In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? Note: There are 2 correct answers to this question.

Options:

A.

The structural profile is maintained and assigned to users using the Profile Generator

B.

The structural profile determines the access mode which the user can perform

C.

The structural profile is maintained and assigned to users using the Implementation Guide

D.

The structural profile determines the accessible object in the organizational structure

Buy Now
Questions 18

User1 grants role 1 to user2. Who can revoke role 1 role from user2?

Options:

A.

The system OBA user

B.

The owner of role 1

C.

Only User1

D.

Any user with the 'ROLE ADMIN' database role

Buy Now
Questions 19

What are the key capabilities of Enterprise Threat Detection? Note: There are 2 correct answers to this question

Options:

A.

Blocking user access

B.

Predictive threat notification

C.

Dashboard-based analysis for security risks

D.

Real time capture of abnormal user activities

Buy Now
Questions 20

What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.

Options:

A.

Analysis of the security vulnerabilities within an SAP landscape

B.

Results containing the list of patches that have to be applied.

C.

Configuration checks of SAP systems

D.

Analysis of the network configuration

Buy Now
Exam Code: P_SECAUTH_21
Exam Name: SAP Certified Technology Professional - System Security Architect
Last Update: May 11, 2025
Questions: 80