What does an authorization profile in an AS ABAP based SAP system contains? A. collection of authorizations
B. The user menu
C. Profile parameters, such as the password expiration time(login/password_expiration_time) D. The collection of the authorizations checks that a user has passed successfully

1 Answer

Answer :

A. collection of authorizations

Related questions

Description : Assuming that you have all required authorizations, which functions can you access in SAP GUI for Java? A. Functions provided by SAP business One B. Functions provided by transactions in AS ... C. Functions provided by SAP NetWeaver Developer Studio D. Functions provided by AS Java SAP systems

Last Answer : B. Functions provided by transactions in AS ABAP based SAP system

Description : You have changed parameters for AS Java of your SAP system based on AS ABAP+ Java. A restart of AS Java is requiredHow can you stop and start the Java stack without restarting the ABAP ... transaction, ICM Monitors (SMICM) D. Use transaction CCMS Control panel: Display Statuses and alerts (RZ03)

Last Answer : C. Use transaction, ICM Monitors (SMICM)

Description : Which of the following settings can you make during the installation of an AS ABAP-based SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. The number of clients in the ... C. The master password for some default users in this SAP system D. The ABAP message server port

Last Answer : C. The master password for some default users in this SAP system D. The ABAP message server port

Description : You want to provide authorizations to a new user in an SAP system based on ASJava 7.10 or higherHow can you do this with the user management engine (UME)? Note: there are 2 correct answered to this ... assign thisgroup to the user D. Add some actions to a group, then assign this group to the use

Last Answer : B. Add some actions to a role, then assign this role to the user C. Add some actions to a role, assign this role to a group, then assign thisgroup to the user

Description : Which user with administration authorizations is available right after the installation of SAP Solution Manager 7.1 to log A. DDIC B. Administrator C. J2EE_ADMIN D. EARLYWATCH

Last Answer : C. J2EE_ADMIN

Description : Consider an SAP system based on AS ABAP How many monitoring segments are used for the CCMS Monitoring Infrastructure? A. There is one monitoring segment for each host B. There is ... segment for each application server D. There is one monitoring segment for each central services instance

Last Answer : A. There is one monitoring segment for each host

Description : Which instances of an SAP system require a running database during their startup? Note: there are 2 correct answered to this question. ? A. Java Central Services Instance B. Additional Application Server Instance C.ABAP Central Services Instance D. Primary Application Server Instance

Last Answer : B. Additional Application Server Instance

Description : Your task is to install an additional application server for an SAP system Which rule applies for the installation work? A. The additional application server has to be installed on a ... additional application server has to be identical to the instance number of the primary application server.

Last Answer : A. The additional application server has to be installed on a separated host from the primary application server

Description : Which post-installations activities are recommended by SAP after the installation of an SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. Restart your SAP system ... of users involved in the implementation project D. Confirm the installation in an SAP Support ticket

Last Answer : A. Restart your SAP system and check logs for errors B. Install a valid license key

Description : What are the options to directly raise an event to trigger an event-dependent job? Note: there are 2 correct answered to this question A. Execute program sapxpg on operating system level B. ... level C. Execute transaction CCMS Control Panel (RZ03) D. Execute the ABAP program BTC_EV,NT_RAISE

Last Answer : D. Execute the ABAP program BTC_EV,NT_RAISE

Description : On operating system level in the log subdirectory of the transport directory, you find the file DEVI990123 QAS What is this file? A. This is the log for the export of transport request DEVK990123 ... D. This is the data file of transport request DEVI990123 which is to be imported into QAS system

Last Answer : C. This is the log file for the main import of transport request DEVI990123into system SAP

Description : Which interface is used to connect SAP Central Process Scheduling in an SAP ECC system? A. Platform Agent B. XBP C. JXBP D. BW-SCH

Last Answer : B. XBP

Description : Which services build the SAP Java Central Services Instance for AS Java 7.10 and higher? A. Message Server and EnqueueServer B. Message Server, Enqueue Server and Gateway Service C. Message Server, Enqueue Server and ICM D. Message Server, Enqueue replicated Server and Gateway Service E.

Last Answer : B. Message Server, Enqueue Server and Gateway Service

Description : A company wants to manage job scheduling centrally and has the requirements toexecute job chains across different SAP systems. Which batch scheduling tool do you recommend? A. SAP Central Process ... Process Scheduling (full version) D. The Job Management work center in SAP Solution Manager

Last Answer : C. SAP Central Process Scheduling (full version)

Description : During the installation of SAP XSS you have to select the Usage Types that should be installedWhich Usage Types are necessary for the installation of SAP XSS? Note: there are 2 correct answered ... . Utilities Customer E-Services B. Enterprise Portal C. Adobe Document Services D. Self Services

Last Answer : D. Self Services

Description : What are the prerequisites to assigning Printing Assistant for Landscapes (PAL) printers to a printer group? A. Distribute the printer group to a target system group. B. Check the ... output device using transaction Spool Administration(SPAD) H. Create the output device as a PAL printer

Last Answer : D. Assign the target system to a target system group

Description : What are the advantages of activating the automatic Program Global Area (PGA) inSAP system that have an Oracle database? Note: there are 2 correct answered to this question A. Higher system ... sort processes will use more memory for efficient sorting D. Less PGA memory is allocated in advance

Last Answer : A. Higher system performance is gained

Description : Which information is stored in a monitoring segment of the alert monitoring infrastructure within the Computing Center Management System (CCMS)? Note: there are 2 corrects answered to this questions A. ... B. The coding of data collectors C. Open alerts within CCMS D. Monitoring definitions

Last Answer : A. Current monitoring data of monitored components B. The coding of data collectors

Description : What are the advantages of using logical spool servers? Note: there are 2 correct answered to this question A. You can create more output devices B. You can balance the load across ... on physical devices D. You can minimize the manual adjustment of output device definitions after the transport

Last Answer : B. You can balance the load across multiple physical spool servers C. You can minimize the load on physical devices

Description : A developer wants to process all transactions in the sequence specified by the application. Which type of Remote Function Call (RFC) implementation do you recommend? A. Background RFC (bgRFC) B. Asynchronous RFC (aRFC) C. Synchronous RFC (sRFC) D. Transactional RFC (tRFC)

Last Answer : D. Transactional RFC (tRFC)

Description : How can you increase the capacity of an Oracle tablespace? Note: there are 2 correct answers in this question A. Resize the existing data file B. Add a new data file to ... compression of backup data using Oracle advanced compression D. Increase the value of the database parameter DB_BLOCK_SIZE

Last Answer : B. Add a new data file to the existing tablespace

Description : Please suggest me the good books on ABAP a programming language which is used for SAP software? I am a begineer and want to know ABAP in detail.

Last Answer : This website contains the abap tutorial and all the materials you need.

Description : Which of the following would not usually be included in the minutes of the board of directors and/or stockholders? a. Declaration of dividends. b. Authorization of long-term loans. c. Authorization of individuals to sign checks. d. The duties and powers of the corporate officers.

Last Answer : The duties and powers of the corporate officers.

Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : A. Hacking

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above

Last Answer : b. Transaction Phase

Description : Why is someone else's username and password put into the login area of a website I frequent?

Last Answer : Split personality? Or someone is using your tablet when you don’t know. It should not happen unless you bought the tablet second hand.

Description : How important is my computer login password (see details)?

Last Answer : answer:I use a really weak password that I can type really fast on my computer. As long as you are behind a router you should be pretty safe. But using sdfjrkjgq43[qwef1S on your computer is kinda ... something that uses DHCP. If you go from a modem to computer you should pick a more secure one.

Description : How do I find my PPPoE login and password if I dont remember it?

Last Answer : Perhaps you should contact geeksquad?

Description : Is there a way to recover a Windows 7 login password?

Last Answer : I was going to suggest Ophcrack, but then I saw your details. Sorry. What about the Trinity Rescue Kit? Or tracking down the person she bought it from (unless they stole it and thus don’t have the password)?

Description : What to do if I forget the login password of TP-Link Wireless Router?

Last Answer : You will have to reset your TP-link router to its default settings.

Description : how to recover a windows login password

Last Answer : Need Answer

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Authentication means: a) Verify Password Only b) Verification of Login name and Password c) To know details of login name d) None of These

Last Answer : b) Verification of Login name and Password

Description : Why does ask-public have Users login with their published user names?

Last Answer : answer:Honestly, there's probably no other reason than because that was the standard at the time. In 2006 (which is when the site launched), basically every website used a username to login. Even now, the vast ... such a ubiquitous login item? (I'm no web designer either, so I can't say for sure.)

Description : How to remove last user to login from MS Outlook 2007?

Last Answer : answer:Try the following Microsoft Office Outllok HOWEVER, it involve changing the registry. IF YOU DON“T KNOW WHAT YOU DOING IT WILL MESS-UP “DA POOTER”

Description : Why when I restart my mac from any user account it restarts back to the main user account without login?

Last Answer : hi, have you tried disabling auto login? You do this in sys prefs -> accounts

Description : When you set up a managing account which common authorizations limit can you specify?

Last Answer : Credit Limit

Description : What are military search authorizations?

Last Answer : Feel Free to Answer

Description : after resetting gmail password until you can successfully log in

Last Answer : You should be able to access your account right away.

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : When an array is passed as parameter to a function, which of the following statements is correct ? (A) The function can change values in the original array. (B) In C, parameters are passed by value, ... . (D) Results in a run time error when the function tries to access the elements in the array.

Last Answer : (A) The function can change values in the original array.

Description : What are the modes of parameters that can be passed to a procedure ?

Last Answer : IN,OUT,IN-OUT parameters.

Description : 6. Budgeted sales of X for March are 18000 units. At the end of the production process for X, 10% of  production units are scrapped as defective. Opening inventories of X for March are ... have successfully  passed the quality control check. The production budget for X for March, in units is:

Last Answer : (d) 16,000

Description : Do user parameters appear in the data modal editor in 2.5?

Last Answer : No

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism