InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Sap Security T-codes? |
| Answer» | |
| 2. |
Please Explain The Personalization Tab Within A Role? |
|
Answer» Personalization is a way to save INFORMATION that could be common to users, I MEANT to a user role… E.g. you can create SAP queries and manage authorizations by user groups. Now this information can be STORED in the personalization tab of the role. (I supposed that it is a way for SAP to address his AMBIGUITY of its concept of user group and roles: is “usergroup” a grouping of people sharing the same ACCESS or is it the role who is the grouping of people sharing the same access). Personalization is a way to save information that could be common to users, I meant to a user role… E.g. you can create SAP queries and manage authorizations by user groups. Now this information can be stored in the personalization tab of the role. (I supposed that it is a way for SAP to address his ambiguity of its concept of user group and roles: is “usergroup” a grouping of people sharing the same access or is it the role who is the grouping of people sharing the same access). |
|
| 3. |
What Is The Parameter In Security Audit Log (sm19) That Decides The Number Of Filters? |
|
Answer» PARAMETER rsau/no_of_filters are USED to DECIDE the NUMBER of FILTERS. Parameter rsau/no_of_filters are used to decide the number of filters. |
|
| 4. |
Mention What Sap Table Can Be Helpful In Determining The Single Role That Is Assigned To A Given Composite Role? |
|
Answer» Table AGR_AGRS will be helpful in determining the SINGLE ROLE that is assigned to a given composite role. Table AGR_AGRS will be helpful in determining the single role that is assigned to a given composite role. |
|
| 5. |
Which Transaction Code Is Used To Display The User Buffer? |
|
Answer» User BUFFER can be displayed by USING TRANSACTION CODE AL08. User buffer can be displayed by using transaction code AL08. |
|
| 6. |
Using Which Table Transaction Code Text Can Be Displayed? |
|
Answer» Table TSTCT can be USED to DISPLAY TRANSACTION CODE TEXT. Table TSTCT can be used to display transaction code text. |
|
| 7. |
Explain What Reports Or Programs Can Be Used To Regenerate Sap_all Profile? |
|
Answer» To REGENERATE SAP_ALL PROFILE, REPORT AGR_REGENERATE_SAP_ALL can be USED. To regenerate SAP_ALL profile, report AGR_REGENERATE_SAP_ALL can be used. |
|
| 8. |
Which T-code Can Be Used To Delete Old Security Audit Logs? |
|
Answer» SM-18 t-code is used to delete the old SECURITY AUDIT LOGS. SM-18 t-code is used to delete the old security audit logs. |
|
| 9. |
Mention Different Tabs Available In Pfcg? |
|
Answer» Description: The tab is used to DESCRIBE the changes made like DETAILS related to the role, addition or removal of t-codes, the AUTHORIZATION object, etc. Menu: It is used for designing user MENUS like addition of t-codes Authorization: Used for maintaining authorization data and authorization profile User: It is used for adjusting user MASTER records and for assigning users to the role. Description: The tab is used to describe the changes made like details related to the role, addition or removal of t-codes, the authorization object, etc. Menu: It is used for designing user menus like addition of t-codes Authorization: Used for maintaining authorization data and authorization profile User: It is used for adjusting user master records and for assigning users to the role. |
|
| 10. |
Explain What Does User Compare Do In Sap Security? |
|
Answer» In SAP security, USER COMPARE option will compare the user MASTER record so that the PRODUCED AUTHORIZATION profile can be entered into the user master record. In SAP security, USER COMPARE option will compare the user master record so that the produced authorization profile can be entered into the user master record. |
|
| 11. |
Explain What Is Pfcg_time_dependency? |
|
Answer» PFCG_TIME_DEPENDENCY is a REPORT that is used for user master comparison. It ALSO clears up the expired profiles from user master RECORD. To directly EXECUTE this report PFUD transaction CODE can also be used. PFCG_TIME_DEPENDENCY is a report that is used for user master comparison. It also clears up the expired profiles from user master record. To directly execute this report PFUD transaction code can also be used. |
|
| 12. |
Mention Which Table Is Used To Store Illegal Passwords? |
|
Answer» To store ILLEGAL PASSWORDS, table USR40 is USED, it is used to store PATTERN of words which cannot be used as a PASSWORD. To store illegal passwords, table USR40 is used, it is used to store pattern of words which cannot be used as a password. |
|
| 13. |
How Many Transactions Codes Can Be Assigned To A Role? |
|
Answer» To a role maximum of 14000 TRANSACTION CODES can be ASSIGNED. To a role maximum of 14000 transaction codes can be assigned. |
|
| 14. |
By Which Parameter Number Of Entries Are Controlled In The User Buffer? |
|
Answer» In USER buffer NUMBER of entries are controlled by the PROFILE PARAMETER “Auth/auth_number_in_userbuffer”. In user buffer number of entries are controlled by the profile parameter “Auth/auth_number_in_userbuffer”. |
|
| 15. |
Explain What Is User Buffer? |
|
Answer» A user buffer CONSISTS of all AUTHORIZATIONS of a user. User buffer can be executed by t-code SU56 and user has its own user buffer. When the user does not have the NECESSARY authorization or contains too many entries in his user buffer, authorization check FAILS. A user buffer consists of all authorizations of a user. User buffer can be executed by t-code SU56 and user has its own user buffer. When the user does not have the necessary authorization or contains too many entries in his user buffer, authorization check fails. |
|
| 16. |
Mention Which T-codes Are Used To See The Summary Of The Authorization Object And Profile Details? |
|
Answer» SU03: It GIVES an OVERVIEW of an AUTHORIZATION object SU03: It gives an overview of an authorization object |
|
| 17. |
Explain What Is Sod In Sap Security? |
|
Answer» SOD means Segregation of Duties; it is implemented in SAP in order to DETECT and PREVENT error or fraud during the BUSINESS transaction. For example, if a user or employee has the privilege to access BANK ACCOUNT detail and payment run, it might be possible that it can divert vendor payments to his own account. SOD means Segregation of Duties; it is implemented in SAP in order to detect and prevent error or fraud during the business transaction. For example, if a user or employee has the privilege to access bank account detail and payment run, it might be possible that it can divert vendor payments to his own account. |
|
| 18. |
Mention What Is The Main Difference Between The Derived Role And A Single Role? |
|
Answer» For the SINGLE ROLE, we can ADD or DELETE the t-codes while for a DERIVED role you cannot do that. For the single role, we can add or delete the t-codes while for a derived role you cannot do that. |
|
| 19. |
What Is The T-code Used For Locking The Transaction From Execution? |
|
Answer» For LOCKING the TRANSACTION from EXECUTION t-code SM01, is USED. For locking the transaction from execution t-code SM01, is used. |
|
| 20. |
Mention What Is The Maximum Number Of Profiles In A Role And Maximum Number Of Object In A Role? |
|
Answer» Maximum NUMBER of PROFILES in a ROLE is 312, and maximum number of object in a role is 150. Maximum number of profiles in a role is 312, and maximum number of object in a role is 150. |
|
| 21. |
Mention What Is The Difference Between Usobt_c And Usobx_c? |
|
Answer» USOBT_C: This table CONSISTS the authorization proposal DATA which contains the authorization data which are relevant for a transaction USOBT_C: This table consists the authorization proposal data which contains the authorization data which are relevant for a transaction |
|
| 22. |
Explain What Things You Have To Take Care Before Executing Run System Trace? |
|
Answer» If you are tracing batch user ID or CPIC, then before executing the Run System Trace, you have to ensure that the id should have been assigned to SAP_ALL and SAP_NEW. It enables the user to execute the job WITHOUT any AUTHORIZATION check FAILURE. If you are tracing batch user ID or CPIC, then before executing the Run System Trace, you have to ensure that the id should have been assigned to SAP_ALL and SAP_NEW. It enables the user to execute the job without any authorization check failure. |
|
| 23. |
Explain How You Can Delete Multiple Roles From Qa, Dev And Production System? |
|
Answer» To delete multiple roles from QA, DEV and Production System, you have to FOLLOW below STEPS:
To delete multiple roles from QA, DEV and Production System, you have to follow below steps: |
|
| 24. |
Explain What Is Authorization Object And Authorization Object Class? |
|
Answer» Authorization Object: Authorization objects are groups of authorization field that REGULATES particular activity. Authorization relates to a particular action while Authorization field relates for security administrators to CONFIGURE SPECIFIC values in that particular action. Authorization object CLASS: Authorization object falls under authorization object classes, and they are grouped by function area like HR, finance, accounting, etc. Authorization Object: Authorization objects are groups of authorization field that regulates particular activity. Authorization relates to a particular action while Authorization field relates for security administrators to configure specific values in that particular action. Authorization object class: Authorization object falls under authorization object classes, and they are grouped by function area like HR, finance, accounting, etc. |
|
| 25. |
Mention What Are The Pre-requisites That Should Be Taken Before Assigning Sap_all To A User Even There Is An Approval From Authorization Controllers? |
|
Answer» Pre-requisites follows like
Pre-requisites follows like |
|
| 26. |
Explain How You Can Lock All The Users At A Time In Sap? |
|
Answer» By EXECUTING EWZ5 t-code in SAP, all the USER can be LOCKED at the same TIME in SAP. By executing EWZ5 t-code in SAP, all the user can be locked at the same time in SAP. |
|
| 27. |
Explain What Is “roles” In Sap Security? |
|
Answer» “Roles” is referred to a GROUP of t-codes, which is assigned to EXECUTE particular BUSINESS task. Each role in SAP requires particular privileges to execute a function in SAP that is called AUTHORIZATIONS. “Roles” is referred to a group of t-codes, which is assigned to execute particular business task. Each role in SAP requires particular privileges to execute a function in SAP that is called AUTHORIZATIONS. |
|
| 28. |
Explain What Is Sap Security? |
|
Answer» SAP security is PROVIDING correct access to BUSINESS users with respect to their AUTHORITY or responsibility and giving PERMISSION according to their roles. SAP security is providing correct access to business users with respect to their authority or responsibility and giving permission according to their roles. |
|