What are the pro and cons of composite roles?
Answer : A, B, C, D
Which authorization object check program (reports) use?
Answer : C
The following logon parameters can be used to ensure your system is adequately secured.
Answer : A, B, C
What are the 2 types of roles implementation strategy?
Answer : A, B
Which of the following are logs that exist in an SAP system? (More than one answer is correct).
Answer : A, B, C, D
Which table defines which authorization checks are to be performed with a transaction and which not?
Answer : D
What are the 2 options and the properties of a stateful user session?
Answer : A, B