Which of the following is a characteristic of composite roles?
Answer : D
Which of following can you modify in basic maintenance of the Profile Generator (PFCG)?
Answer : B
Which of the following users investigate the application log to analyze business data?
Note: There are 2 correct answers to this question.
Answer : B, C
You have to analyze risk and perform remediation to enable end-to-end compliance.
What is the correct sequence of steps?
Answer : C
After roles were transported from an SAP development system to a test system, a technical manager reported a problem with a user role assignment in the test system.
What do you have to configure to prevent the transport of user assignments?
Answer : D
Which of the following can the security audit log record?
Note: There are 3 correct answers to this question.
Answer : A, D, E
Which of the following sequences of steps can you use to create a user-defined role?
Note: There are 2 correct answers to this question.
Answer : C, D