SAP Security Interview Questions And Answers
Download SAP Security Interview Questions and Answers PDF
Enhance your SAP Security interview preparation with our set of 32 carefully chosen questions. These questions are specifically selected to challenge and enhance your knowledge in SAP Security. Perfect for all proficiency levels, they are key to your interview success. Secure the free PDF to access all 32 questions and guarantee your preparation for your SAP Security interview. This guide is crucial for enhancing your readiness and self-assurance.
32 SAP Security Questions and Answers:
SAP Security Job Interview Questions Table of Contents:
1 :: What is the rule set in GRC?
Collection of rules is nothing but rule set. There is a
default rule set in GRC called Global Rule Set.
Read Moredefault rule set in GRC called Global Rule Set.
2 :: What is use of su56?
Displays the current users Authorization Profiles available
ti the ID. Can also be used to reset their User buffer to
pick up new roles and authorizations.
Read Moreti the ID. Can also be used to reset their User buffer to
pick up new roles and authorizations.
3 :: What is use of derived roles and where it is used?
Derived roles are also called as Child Roles and Master
Roles are called as Parent Roles.
Derived Roles refers to the roles that already exist. As
name indicates Derived roles are derived from other role
(Master Role).
Derived ROles inherits the menu structure and functions
included (transactions, reports, Weblinks and so on) from
the role referenced.
The default authorization values of the derived role are
that of the inherited role. The Org Levels are to be
maintained in the derived Role
Read MoreRoles are called as Parent Roles.
Derived Roles refers to the roles that already exist. As
name indicates Derived roles are derived from other role
(Master Role).
Derived ROles inherits the menu structure and functions
included (transactions, reports, Weblinks and so on) from
the role referenced.
The default authorization values of the derived role are
that of the inherited role. The Org Levels are to be
maintained in the derived Role
4 :: How to lock all the users at a time?
This is one way to lock the users by executing Tcode EWZ5.
another way is by executing su10... authoriztion tab....
evaluate the users list......... transfer...... execute
Read Moreanother way is by executing su10... authoriztion tab....
evaluate the users list......... transfer...... execute
5 :: How can find out whether CUA(Central User Administration) is configured on your sap system?
Execute su01
You can find out a tab called system tab....
If system tab is not displayed there in su01 screen there
is no CUA is configured.
Read MoreYou can find out a tab called system tab....
If system tab is not displayed there in su01 screen there
is no CUA is configured.
6 :: One of the user logged into Production System, changed a table and then logged out. How will you track him?
We need to login to the system the change has taken, Go to
SM20 you need to select the date and time or range in time
tab, select * in the user tab once you key in all the
inputs be sure to select the servers or instance on left
hand side and then execute.
you need to select the user master record.
You will get report for user master record, find the user
id in the list
Read MoreSM20 you need to select the date and time or range in time
tab, select * in the user tab once you key in all the
inputs be sure to select the servers or instance on left
hand side and then execute.
you need to select the user master record.
You will get report for user master record, find the user
id in the list
7 :: How do we test security systems. What is the use of SU56?
Through Tcode SU56, We will check the users buffer
Read More8 :: What is the landscape of GRC?
GRC Landscape is 2 system landscape,
1. SAP GRC DEV
2. SAP GRC PRD
in GRC there is no Quality system.
Read More1. SAP GRC DEV
2. SAP GRC PRD
in GRC there is no Quality system.
9 :: How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations?
Execute SM37 and search for PFCG_TIME_DEPENDENCY
Read More10 :: How we Schedule and administering Background jobs?
scheduling and administrating of background jobs can be done
by using tcodes sm36 and sm37
Read Moreby using tcodes sm36 and sm37
11 :: How we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS?
We can restrict autho groups via object S_TABU_DIS, first
we need to create a autho group in SE54 then assign this
autho group in a role by using the object: S_TABU_DIS.
Read Morewe need to create a autho group in SE54 then assign this
autho group in a role by using the object: S_TABU_DIS.
12 :: What are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers?
prerequisites are follows before assigning sap_all to any
user .
1.enabling the audit log ---- using sm19 tcode.
2.retreving the audit log-----using sm20 tcode.
this process follows when your not implementing grc in your
system.
Read Moreuser .
1.enabling the audit log ---- using sm19 tcode.
2.retreving the audit log-----using sm20 tcode.
this process follows when your not implementing grc in your
system.
13 :: What are the Critical Tcodes and Authorization Objects in R/3?
Just to say all the t-codes which can affect roles and user master records are critical ones. SU01, PFCG, RZ10, RZ11, SU21, SU03, Sm37 are some of critical t-codes.
Below are critical objects
S_TABU_DIS
S_USER_AGR
S_USER_AUT
S_USER_PRO
S_USER_GRP
Read MoreBelow are critical objects
S_TABU_DIS
S_USER_AGR
S_USER_AUT
S_USER_PRO
S_USER_GRP
14 :: If u r using 10 firefighter ids at a time? How will the log reports goes to controller?
This is done when ever role is already assigned to users and changes are done in that role. In order to get the changes adjusted in the roles, user comparision is done.
Read More15 :: What is ruleset? and how to update risk id in rule set?
Also during indirect asssignment of roles to user using t codes Po13 and po10, we have to to do user comparision, so that the roles get reflected in the SU01 record of user.
Read More16 :: What is the procedure for Role modifications? explain with example?
Generally this task is done PFCG_TIME_DEPENDENCY background job which runs once daily so that roles are adjusted after running this report.
Read More17 :: Who will done user comparison?
If changes are to be reflected immediately, user comparison is recommended.
Read More19 :: What is the maximum number of authorization objects in a role?
150 authorization objects,
Read More20 :: What is the maximum number of authorization in an object?
not more than 10 authorization fields in object,
Read More21 :: What is the difference between PFCG,PFCG_TIME_DEPENDENCY&PFUD?
PFCG is used to create maintain and modify the roles.
PFCG_TIME_DEPENDENCY is a background job of PFUD.
PFUD is used for mass user comparison but the difference is
if you set the background job daily basis it will do mass
user comparison automatically
Read MorePFCG_TIME_DEPENDENCY is a background job of PFUD.
PFUD is used for mass user comparison but the difference is
if you set the background job daily basis it will do mass
user comparison automatically
22 :: What does the Profile Generator do?
we can create roles , transport , copy ,
download,modifications , all these thing done from pfcg t-
code.
Read Moredownload,modifications , all these thing done from pfcg t-
code.
23 :: What is the main purpose of Parameters, Groups &
Personalization tabs?
parameters : when ever user want some defaults values
when ever he/she excute the t-code we can mainatian some
pid's by taking help of abapers.
Read Morewhen ever he/she excute the t-code we can mainatian some
pid's by taking help of abapers.
24 :: Tell me about derived role?
Derived roles..To restrict the user access based on
organizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
Read Moreorganizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
25 :: What is the main difference between single role and a derived role?
Main difference--we can add/delete the tcodes for the
single roles but we cann't do it for the derived roles.
Read Moresingle roles but we cann't do it for the derived roles.