Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > SAP > SAP Certified Associate > C_SEC_2405

C_SEC_2405 SAP Certified Associate - Security Administrator Question and Answers

Question # 4

Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2 correct answers to this question.

A.

Communication

B.

Dialog

C.

Service

D.

System

Full Access
Question # 5

Which of the following functions within SAP GRC Access Control support access certification and review? Note: There are 2 correct answers to this question.

A.

Role Review

B.

SOD Review

C.

Role Reaffirm

D.

User Reaffirm

Full Access
Question # 6

What are some security safeguards categories? Note: There are 3 correct answers to this question.

A.

Access Control

B.

Physical

C.

Organizational

D.

Financial

E.

Technical

Full Access
Question # 7

When creating PFCG roles for SAP Fiori access, what is included automatically when adding a catalog to the menu of a back-end PFCG role? Note: There are 2 correct answers to this question.

A.

The start authorizations and the authorization default values for each IWSG TADIR service definitions in the catalog.

B.

The IWSG TADIR service definitions from the catalog.

C.

The start authorizations and the authorization default values for each IWSV TADIR service definitions in the catalog.

D.

The IWSV TADIR service definitions from the catalog.

Full Access
Question # 8

SAP BTP distinguishes between which of the following users? Note: There are 2 correct answers to this question.

A.

Key users

B.

Technical users

C.

Business users

D.

Platform users

Full Access
Question # 9

Which tool can you use to modify the entities schema content across multiple repositories?

A.

SAP BTP Account Explorer

B.

SAP Cloud Identity Services Transformation Editor

C.

SAP Cloud Identity Services Schemas app

D.

SAP Business Application Studio

Full Access
Question # 10

To connect to data sources that are NOT all based on OData, which of the following options does SAP recommend you use?

A.

OData Provisioning service

B.

SAP Process Integration

C.

Cloud connector

D.

SAP Integration Suite

Full Access
Question # 11

Which user type in SAP S/4HANA Cloud Public Edition is used for API access, system integration, and scenarios where automated data exchange is required?

A.

SAP Communication User

B.

SAP Administrative User

C.

SAP Support User

D.

SAP Technical User

Full Access
Question # 12

What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3 correct answers to this question.

A.

It is prioritized.

B.

It is categorized.

C.

It is pseudonymized.

D.

It is normalized.

E.

It is enriched.

Full Access
Question # 13

Under which of the following conditions can you merge authorizations for the same object during role maintenance? Note: There are 2 correct answers to this question.

A.

The activation status of a manual authorization must match the status of the changed authorizations.

B.

The activation status and the maintenance status of the authorizations must match.

C.

The maintenance status of the changed authorizations must match the status of a manual authorization.

D.

The activation status and the maintenance status of the authorizations must NOT match.

Full Access
Question # 14

What can be assigned directly to a user when using the SAP Launchpad service in SAP BTP?

A.

Spaces

B.

Launchpad roles

C.

Catalogs

D.

Role collections

Full Access
Question # 15

Which log types are available in the Administration Console of Cloud Identity Services? Note: There are 2 correct answers to this question.

A.

Usage logs

B.

Troubleshooting logs

C.

Change logs

D.

Performance logs

Full Access
Question # 16

What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3 correct answers to this question.

A.

Role maintenance reads applications from a catalog.

B.

Role maintenance reads applications from role menus.

C.

Manual role authorizations are supported in custom catalogs.

D.

Authorization defaults define role authorizations.

E.

Catalogs are assigned to role menus.

Full Access
Question # 17

Which functions in SAP Access Control can be used to approve or reject a user’s continued access to specific security roles? Note: There are 2 correct answers to this question.

A.

SOD Review

B.

Role Certification

C.

User Access Review

D.

Role Reaffirm

Full Access
Question # 18

Which object type is assigned to activated OData services in transaction SU24?

A.

HTTP

B.

G4BA

C.

IWSG

D.

IWSV

Full Access
Question # 19

In the administration console of the Cloud Identity Services, which system property types can you add? Note: There are 2 correct answers to this question.

A.

Internal

B.

Credential

C.

Default

D.

Standard

Full Access
Question # 20

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2 correct answers to this question.

A.

Authorization privileges

B.

Client connect restrictions

C.

Identity providers

D.

Password policy settings

Full Access
Question # 21

You are building a PFCG role for access to an SAP Fiori app on your SAP S/4HANA on-premise system. After you enter the catalog in the role menu, an entry for an OData service is missing and you have to add it manually to the role menu. When you maintain authorization data in the PFCG role, why does SAP recommend that you NOT maintain the SRV_NAME field value of the S_SERVICE authorization object manually?

A.

Because the SRV_NAME hash value for the front-end server component and back-end server component are the same.

B.

Because the TADIR Service name for the back-end server component was automatically added to the role menu.

C.

Because the SRV_NAME hash value for the front-end server component and back-end server component are different.

D.

Because the TADIR Service name is the same for the front-end server component and the back-end server component.

Full Access
Question # 22

Which levels of security protection are provided by Secure Network Communication (SNC)? Note: There are 3 correct answers to this question.

A.

Authentication

B.

Privacy

C.

Integrity

D.

Availability

E.

Authorization

Full Access
Question # 23

What use cases are available for a Local Identity Directory? Note: There are 3 correct answers to this question.

A.

Merging attributes

B.

Classic use case

C.

Hybrid mode

D.

Proxy mode

E.

S/4HANA use case

Full Access
Question # 24

What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?

A.

Field values have not been changed.

B.

The field delivered with content was changed but the old value was retained.

C.

Field values were changed as a result of the merge process.

D.

Field values were unchanged and no new authorization was added.

Full Access