Which of the following tables contain transport request object lists and table entry keys? (Choose two.)
A. E071K
B. E070
C. E070L
D. E071
When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)
A. If the PFCG role menu contains SAP Fiori Tile Groups
B. If the PFCG roles contain all of the start authorizations required for the application
C. If there is an application start lock
D. If the PFCG roles are assigned to end users
Which of the following are system security threats? (Choose three.)
A. Availability
B. Code injection
C. Authorization violation
D. System penetration
E. Nonrepudiation
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? (Choose two.)
A. Static and Dynamic Application Security Testing
B. Deprovisioning of problematic ABAP code
C. Capture of manual and automated check executions
D. Direct integration with Root Cause Analysis
Which of the following items are addressed by Configuration Validation? (Choose three.)
A. Database parameters
B. Critical roles
C. Software packages
D. Failed transports
E. RFC logins
What is the equivalent of the AS ABAP user type System in the AS Java UME security policy?
A. Default user
B. J2EE user
C. Technical user
D. Internal service user
In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data? (Choose three.)
A. Java system database
B. Directory /usr/sap
C. LDAP Directory
D. UDDI provider
E. ABAP-based SAP system
Your company uses derived roles. During maintenance of the Plant Manager imparting role, you add a new transaction to the Menu tab which introduces a new organizational level that will be unique for each of your 150 plants. How will the new organization level be maintained in the derived roles?
A. All at once using transaction PFCGMASSVAL
B. Automatically using the Copy Data button during maintenance of the imparting role
C. Automatically after generating the profiles of the imparting role and adjusting the derived roles
D. Manually by maintaining each derived role individually
Which of the various protocols can be used to establish secure communication? (Choose three.)
A. From Secure Login Client to Secure Login Server: DIAG/RFC (SNC), HTTPS, RADIUS
B. From Business Explorer to SAP Netweaver: DIAG/RFC (SNC), HTTPS (SSL)
C. From SAP GUI to SAP Netweaver: DIAG/RFC (SNC)
D. From Secure Login Server to SAP Netweaver: RFC (SNC)
E. From Secure Login Server to LDAP Server: HTTPS (SSL)
Which configuration options apply to the usage of VCLIENT in the parameter icm/server_port_
A. VCLIENT value must be specified if SSL configuration is defined by SSLCONFIG
B. VCLIENT default value is 0
C. VCLIENT=1, the server asks the client to transfer a certificate
D. VCLIENT default value is 1
E. VCLIENT=0, which notifies the SSL server that no SSL client verification is needed
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C_SECAUTH_20 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.