InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What are the values for user lock? |
||||||||||||||
|
Answer» To determine whether the user is locked or not, we use the USR02 table. Below is a table showing the 6 types of user lock VALUES:
The SAP Security solution allows you to monitor and regulate access to your company's systems and data both internally and externally. Globally, leading multinational businesses rely on SAP solutions to manage their operations and workflow. Consequently, SAP Security is one of the most rewarding careers in the technology world today, and SAP Security developers are in high demand. Therefore, you have an excellent chance of moving AHEAD as an SAP Security developer. Are you ready to ACE your SAP Security interview? Useful Resources:
|
|||||||||||||||
| 2. |
Would it be possible to mass delete roles without deleting the new roles in SAP? |
|
Answer» SAP PROVIDES a report i.e., (AGR_DELETE_ALL_ACTIVITY_GROUPS), which you can COPY, then remove the system type check, and then execute/run. For mass deletion of roles without deleting the new roles in SAP, simply enter the roles that you wish to delete in a TRANSPORT (a package used for transferring data between SAP installations), run/execute the delete program or either delete manually, then RELEASE the transport and finally import the roles into all client systems. As soon as your transport, the role is deleted from all client systems. It is necessary to tweak/debug & replace the code in AGR_DELETE_ALL_ACTIVITY_GROUPS to ENSURE it is deleting only SAP delivered roles. Getting past that little bit makes it work well. |
|
| 3. |
What is Profile Version? |
|
Answer» Profiles contain a set of rights and restrictions associated with a specific user or group. User profiles specify what actions (like viewing, creating, and editing) a user is allowed to perform on various resources, like SOURCING documents or master data. Changing and saving a profile does not OVERWRITE the old status in the database. Instead, a new version is CREATED with the UPDATED values. SAP ASSIGNS a unique number to each profile version. Create a new profile, for example, and it will have a version number of 1. After that, additional profiles will have sequential version numbers. |
|
| 4. |
Apparently, someone deleted users from our system, and I would like to know who did so. Is there a table where this is recorded or logged? |
|
Answer» This information can be OBTAINED by debugging the system or by using the RSUSR100 report. This report can be USED to DETERMINE all changes made to the user (user change HISTORY). |
|
| 5. |
Explain PFCG_Time_Dependency. |
|
Answer» The PFCG_TIME_DEPENDENCY report is an Executable ABAP (Advanced Business Application Programming) Report WITHIN your SAP system. PFCG_TIME_DEPENDENCY is a report used for comparing user MASTERS. In ADDITION, it deletes or removes expired profiles from the user master record. This report can also be DIRECTLY executed using the PFUD T-code. |
|
| 6. |
In which table are illegal passwords stored? |
|
Answer» The USR40 table is a standard authentication and SSO (Single Sign-On) TRANSPARENT Table in SAP Basis, which stores data about ILLEGAL PASSWORDS. It is used to gather illegal passwords and STORE them in various arrangements and patterns of words that can be implemented at the moment of creating the passwords. |
|
| 7. |
Describe the steps one needs to take before running the Run system trace. |
|
Answer» There are a few things that need to be done before one WANTS to execute the Run system trace. If one is going to trace the CPIC or the user ID prior to executing the Run system then one has to MAKE sure that the SAID ID is given to SOMEONE that is either SAP_new or SAP_all. This has to be done because it ENSURES that one is able to execute the work without any kind of checking failure by authorization. |
|
| 8. |
What are the main tabs available in PFCG (Perfectly Functionally Co-coordinating Group)? |
|
Answer» In the PFCG, there are MANY important and essential tabs, including the following:
|
|
| 9. |
What is the procedure for deleting multiple roles from the QA (Quality Assurance), DEV (Development), and Production systems? |
|
Answer» In ORDER to delete multiple ROLES from QA, DEV, and Production systems, you must FOLLOW the steps below:
|
|
| 10. |
Which T-codes can be used to display user buffers, and delete old security audit logs? |
|
Answer» T-code used to display USER buffers, and delete old SECURITY audit logs are as follows:
|
|
| 11. |
What does User buffer mean? Which parameter controls the number of entries in the user buffer? |
|
Answer» An SAP system AUTOMATICALLY creates a USER buffer when a user signs on. This buffer includes all authorizations for that user. Each user has their own buffer, which they can display using the T-code SU56. The tool is only for monitoring purposes, and no further ACTION can be taken. The following profile PARAMETER controls the number of entries in the user buffer: “Auth/auth_number_in_userbuffer”. |
|
| 12. |
Which authorization objects are needed to create and maintain user records? |
|
Answer» In ORDER to CREATE and MAINTAIN a user RECORD, you need the following authorization objects:
|
|
| 13. |
What t-code is used to maintain Authorization Object and profile? |
|
Answer» T-code used to MAINTAIN Authorization OBJECT and profile are as follows:
|
|
| 14. |
Explain authorization class and authorization object. |
Answer»
|
|
| 15. |
Differentiate between USOBT_C and USOBX_C. |
||||||
|
Answer» USOBX_C and USOBT_C are customer-specific tables, and the C in their names INDICATES that these tables contain customer-specific values that are maintained/changed using the T-code SU24. Differences between USOBT_C and USOBX_C are as follows:
|
|||||||