Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)?
Note: There are 3 correct answer to this question.
A. Data Logging
B. Data Destruction
C. Data Archiving
D. Data retention
E. Alert Notification
正解:B,D
質問 2:
Which of the following are the examples of personal data under the GDPR? Note: There are 3 correct answer to this question.
A. Email Address
B. Age Group
C. Aggregated statistics on the use of a product
D. GPS data from Cellular phone
E. IP Address
正解:A,D,E
質問 3:
Which feature is available in the CommonCryptoLib Scenario provided by SAP Security Library?
A. SSL/TLS
B. Secure Store and Forward(SSF)
C. SPNEGO/ABAP
D. Hardware Security Model (HSM)
正解:B
質問 4:
Which of the following defines "Phishing"?
A. Modifying an IP address of the source of the TCP/IP packet
B. Acquiring sensitive information by masquerading as trustworthy entity
C. Pretending to be another user
D. Overloading an application with request
正解:B
質問 5:
Which of the following objects allows you to restrict which users can distribute a role to another system using an RFC destination?
A. S_USER_STA
B. S_USER_AUT
C. S_USER_SYS
D. S_USER_AGR
正解:C
質問 6:
Which TADIR Service Object type includes business functional authorization objects used within the OData execution?
A. IWSC
B. OSOD
C. IWSV
D. IWSG
正解:D
原沙** -
C_SECAUTH_20試験に合格しました。精度が確かに高いです。心から感謝します。