Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?
Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this question
In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program?
Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question
Where can you store Security Audit Log Events? Note: There are 2 correct answers to this question.
What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question
What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note: There are 3 correct answers to this question.
You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SAP NetWeaver AS systems (hostl.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server's PSE?
Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?
Which authorization object is required to support trusted system access by an RFC user following the configuration of a Managed System in SAP Solution Manager?
How can you describe the hierarchical relationships between technical entities in the Cloud Foundry?
In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? Note: There are 2 correct answers to this question.
What are the key capabilities of Enterprise Threat Detection? Note: There are 2 correct answers to this question
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.
SAP Certified Technology Professional | P_SECAUTH_21 Questions Answers | P_SECAUTH_21 Test Prep | P_SECAUTH_21 Online Exam | P_SECAUTH_21 Practice Test | P_SECAUTH_21 PDF | P_SECAUTH_21 Test Questions | P_SECAUTH_21 Study Material | P_SECAUTH_21 Exam Preparation | P_SECAUTH_21 Valid Dumps | P_SECAUTH_21 Real Questions | SAP Certified Technology Professional P_SECAUTH_21 Exam Questions