Which of the following are core principles of GDPR? (Choose three.)
A. Data Archiving
B. Lawfulnaess, Fairness and Transparency
C. Storage Limitations
D. Data Quality
E. Data Minimization
Which of the following are examples of personal data under the GDPR? (Choose three.)
A. IP address
B. Aggregated statistics on the use of a product
C. GPS data from a cellular phone
D. Age group
E. E-mail address
Which of the following correctly describe the SAP Security Optimization Service (SOS) offerings? (Choose three.)
A. Self Service: performed by experienced service engineers
B. Onsite Service: performed by specialists
C. Onsite Service: available with additional costs
D. Remote Service: part of CQC service offering
E. Self Service: all completely automated checks in all SAP systems
SAP Cloud Identity and Access Governance consists of which of the following software services? (Choose three.)
A. Access Request
B. User Access Certification
C. Emergency Access Management
D. Access Analysis
E. Role Design
What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.)
A. Mitigations
B. Risk library
C. Emergency access
D. Process hierarchy
E. Mitigation controls
You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?
A. Data Steward
B. Data Processor
C. Data Subject
D. Data Controller
Where is the application log information (SLG1) saved?
A. In the location specified by the rsau/local/file parameter
B. In the directory specified by DIR_TRANS parameter
C. In the database
D. In the directory specified by DIR_LOGGING parameter
What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)
A. Monitoring of GDPR compliance
B. Segregation of Duty analysis
C. Forensic investigations
D. Realtime alerts
E. Monitoring of security events
Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.)
A. SAP IQ
B. SAP HANA Smart Data Streaming
C. SAP ASE D. Forensic lab
Which of the following defines "Phishing"?
A. Pretending to be another user
B. Acquiring sensitive information by masquerading as a trustworthy entity
C. Overloading an application with requests
D. Modifying an IP address of the source of the TCP/IP packet
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C_SECAUTH_20 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.