Which of the following actions allows you to schedule the execution of a report from transaction SA38 at an off-peak time?
Answer : D
Which of the following are characteristics of system superuser SAP*?
Note: There are 2 correct answers to this question.
Answer : A, B
What check must you carry out to analyze system data with Security Optimization Self Service?
Answer : B
Which of the following must be available before you can perform Security Optimization Service checks for SAP vulnerability risks?
Answer : A
Why would you add project views of the Implementation Guide (IMG) to an existing role?
Note: There are 2 correct answers to this question.
Answer : C, D
Which of the following are components of SAP NetWeaver Identity Management?
Note: There are 3 correct answers to this question.
Answer : A, C, E
Which of the following authorization objects must you assign to a user in SAP Solution Manager and in the SAP managed system to make sure that a trusted Remote Function Call connection is established?
Answer : D