Free Questions – SAP System Security and Authorizations – C_SECAUTH_20

Home Miscellaneous Exam Preparation Free Questions – SAP System Security and Authorizations – C_SECAUTH_20

About Certification Exam

The “SAP Certified Technology Associate – SAP System Security and Authorizations” (C_SECAUTH_20) certification exam verifies that the candidate has the fundamental and core knowledge required of a technology consultant profile in the area of SAP system security. This certificate proves that the candidate has a basic and overall understanding about securing SAP systems and SAP’s authorization concepts in SAP Business Suite and SAP S4/HANA, and can put this knowledge into practice as a member of a project team.

Topic Areas :

  • Authorization and Role Maintenance > 12%
  • SAP Fiori Authorizations and S/4HANA > 12%
  • Access Governance and Compliance in SAP 8% – 12%
  • Infrastructure Security and Authentication 8% – 12%
  • User Administration 8% – 12%
  • Security Monitoring and Security Assessment 8% – 12%
  • Data Privacy Governance and Cybersecurity 8% – 12%
  • Security Audit 8% – 12%

Read more about this at SAP website.

Sample Questions

  1. Where is the application log information (SLG1) saved?
    • In the Database
    • In the location specified by the rsau/local/file parameter
    • In the Directory specified by DIR_LOGGING parameter
    • In the Directory specified by DIR_TRANS parameter
      • Correct Answer – A
  2. Which application allows a role developer to perform the mass maintenance of menu options from selected SAP Fiori Title Catalogs?
    • PRGN_PRINT_AGR_MENU
    • PRGN_COMPARE_ROLE_MENU
    • PRGN_CREATE_FIORI_FRONTENDROLE
    • PRGN_CREATE_FIORI_BACKENDROLES
      • Correct Answer – C
  3. Which transaction code allows you to configure the SAP System Audit Log?
    • SM20
    • SM19
    • SM18
    • SUIM
      • Correct Answer – B
  4. You are Configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure access?
    • It allows you to specify access to tables associated with a specific authorization group
    • It allows you specify access to specific client-dependent table
    • It allows you specify access to a specific client independent table
    • It allows you specify access to tables reference by a specific program group
      • Correct Answer – A

Udemy Course

If you are planning to Certify and looking for more practice questions similar to the real exam. Please consider this quiz course at udemy which covers:

  • 2 sample practice quizes – 40 questions each
  • 1 Mock test similar to the real exam. (80 questions)

Click to see the details of the course

Related Posts

Scroll to Top