You have to analyze risk and perform remediation to enable end-to-end compliance.
What is the correct sequence of steps?
A. 1. Identify and select risks to manage.
2.Build and maintain rules.
3.Detect authorization risk.
4.Test and report the risk.
5.Remediate and mitigate risk.
6.Prevent the risk.
B. 1. Identify and select risks to manage.
2.Build and maintain rules.
3.Remediate and mitigate risk.
4.Detect authorization risk.
5.Test and report the risk.
6.Prevent the risk.
C. 1. Identify and select risks to manage.
2.Build and maintain rules.
3.Detect authorization risk.
4.Remediate and mitigate risk.
5.Test and report the risk.
6.Prevent the risk.
D. 1. Identify and select risks to manage.
2.Build and maintain rules.
3.Remediate and mitigate risk.
4.Test and report the risk.
5.Detect authorization risk.
6.Prevent the risk.
正解:C
質問 2:
A security manager is asked to gather the average dialog response time over the last 30 minutes.
Which of the following transactions can list this information?
A. RZ01
B. RZ10
C. RZ20
D. RZ03
正解:C
質問 3:
Which of the following environments are provided by SAP NetWeaver?
Note: There are 2 correct answers to this question.
A. A client/server environment
B. A Java runtime environment
C. A three-tier environment
D. An ABAP runtime environment
正解:B,D
質問 4:
What data is transferred from a reference role to a derived role?
Note: There are 2 correct answers to this question.
A. User assignments
B. Transactions
C. Reports
D. Profiles
正解:B,C
質問 5:
Which of the following can you use to create users in the context of active Central User Administration (CUA)?
A. Transaction SU01 in the central system
B. Transaction PFCG in the central system
C. Transaction PFCG in the child system
D. Transaction SU01 in the child system
正解:A
質問 6:
Which of the following is a characteristic of composite roles?
A. They have their own authorization data.
B. Users assigned to composite roles have their own authorization data.
C. Users assigned to composite roles are automatically assigned to the elementary roles.
D. They can be assigned to other composite roles.
正解:C
質問 7:
Which authorization object can you use to specify both roles and activities for authorization control?
A. S_USER_VAL
B. S_USER_PRO
C. S_USER_GRP
D. S_USER_AGR
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
岩井** -
きのう試験に受験して、内容が暗記したC_AUDSEC_731問題集の問題にそっくりの問題がいくつかあって、助かりました。