Exam Details

  • Exam Code
    :C_SECAUTH_20
  • Exam Name
    :SAP Certified Technology Associate - SAP System Security and Authorizations
  • Certification
    :SAP Certifications
  • Vendor
    :SAP
  • Total Questions
    :80 Q&As
  • Last Updated
    :Mar 25, 2025

SAP SAP Certifications C_SECAUTH_20 Questions & Answers

  • Question 11:

    Which of the following are core principles of GDPR? (Choose three.)

    A. Data Archiving

    B. Lawfulnaess, Fairness and Transparency

    C. Storage Limitations

    D. Data Quality

    E. Data Minimization

  • Question 12:

    Which of the following are examples of personal data under the GDPR? (Choose three.)

    A. IP address

    B. Aggregated statistics on the use of a product

    C. GPS data from a cellular phone

    D. Age group

    E. E-mail address

  • Question 13:

    Which of the following correctly describe the SAP Security Optimization Service (SOS) offerings? (Choose three.)

    A. Self Service: performed by experienced service engineers

    B. Onsite Service: performed by specialists

    C. Onsite Service: available with additional costs

    D. Remote Service: part of CQC service offering

    E. Self Service: all completely automated checks in all SAP systems

  • Question 14:

    SAP Cloud Identity and Access Governance consists of which of the following software services? (Choose three.)

    A. Access Request

    B. User Access Certification

    C. Emergency Access Management

    D. Access Analysis

    E. Role Design

  • Question 15:

    What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.)

    A. Mitigations

    B. Risk library

    C. Emergency access

    D. Process hierarchy

    E. Mitigation controls

  • Question 16:

    You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?

    A. Data Steward

    B. Data Processor

    C. Data Subject

    D. Data Controller

  • Question 17:

    Where is the application log information (SLG1) saved?

    A. In the location specified by the rsau/local/file parameter

    B. In the directory specified by DIR_TRANS parameter

    C. In the database

    D. In the directory specified by DIR_LOGGING parameter

  • Question 18:

    What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)

    A. Monitoring of GDPR compliance

    B. Segregation of Duty analysis

    C. Forensic investigations

    D. Realtime alerts

    E. Monitoring of security events

  • Question 19:

    Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.)

    A. SAP IQ

    B. SAP HANA Smart Data Streaming

    C. SAP ASE D. Forensic lab

  • Question 20:

    Which of the following defines "Phishing"?

    A. Pretending to be another user

    B. Acquiring sensitive information by masquerading as a trustworthy entity

    C. Overloading an application with requests

    D. Modifying an IP address of the source of the TCP/IP packet

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C_SECAUTH_20 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.