What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3correct answers to this question.
Which protocol is the industry standard for provisioning identity and access management in hybrid landscapes?
Which user types can log on to the SAP S/4HANA system in interactive mode? Note: There are 2correct answers to this question.
Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2correct answers to this question.
In the SAP BTP Cockpit, at which level is Trust Configuration available? Note: There are 2correct answers to this question.
In the administration console of the Cloud Identity Services, for which system type can you define both read and write transformations?
Which of the following are SAP Fiori Launchpad functionalities? Note: There are 2correct answers to this question.
What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3correct answers to this question.
In the administration console of the Cloud Identity Services, which authentication providers are available? Note: There are 2correct answers to this question.
What must you do if you want to enforce an additional authorization check when a user starts an SAP transaction?
Which limitations apply to restricted users in SAP HANA Cloud? Note: There are 3correct answers to this question.
When planning an authorization concept for your SAP S/4HANA Cloud Public Edition implementation, what rules must you consider? Note: There are 2correct answers to this question.
What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3correct answers to this question.
Which entities share data with Business Partners in the S/4HANA Business User Concept? Note: There are 2correct answers to this question.
Which solution is NOT used to identify security recommendations for the SAP Security Baseline?
What authorization object can be used to restrict which users a security administrator is authorized to maintain?
Where can you find SAP Fiori tiles and target mappings according to segregation of duty?
Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?
Which of the following services does the Identity Authentication Service provide? Note: There are 2correct answers to this question.