Download SAP Certified Application Associate -SAP BusinessObjects Access Control 10-0.examcollection.C_GRCAC_10.2019-10-01.1e.48q.vcex


Download Exam

File Info

Exam SAP Certified Application Associate - SAP BusinessObjects Access Control 10.0
Number C_GRCAC_10
File Name SAP Certified Application Associate -SAP BusinessObjects Access Control 10-0.examcollection.C_GRCAC_10.2019-10-01.1e.48q.vcex
Size 26 Kb
Posted October 01, 2019
Downloads 19



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Which periodic review process allows a role owner to remove roles from the users?

  • A: UAR Review
  • B: SoD Review
  • C: Firefighter Log Review
  • D: Role Certification Review



Question 2
Which report types require the execution of batch risk analysis? (Choose two.)

  • A: Ad-hoc risk analysis reports
  • B: Offline risk analysis reports
  • C: User level simulation reports
  • D: Access rules detail reports
  • E: User and role analysis dashboards



Question 3
You have created a new end-user personalization (EUP) form. 
Where can you make use of this EUP form? (Choose two.)

  • A: In a stage configuration of a workflow
  • B: In an organizational assignment request
  • C: In a template-based request
  • D: In a model user request



Question 4
Your customer wants to eliminate false positives from their risk analysis results. 
How must you configure Access Control to include organizational value checks when performing a risk analysis? (Choose two.)

  • A: Configure organization rules for each relevant function.
  • B: Update the functions that contain each relevant action by activating the fields for the required permissions and maintaining a value for each specific organization.
  • C: Configure organization rules for each relevant risk.
  • D: Configure organization level system parameters to incorporate all organization levels for each relevant risk.



Question 5
You want to maintain roles using Business Role Management. 
How do you import the roles from the back-end system?

  • A: Use an SAP transport.
  • B: Execute the Role Import background job directly in the back-end system.
  • C: Use the standard import template.
  • D: Execute the Role Repository Sync program.



Question 6
Which configuration parameters determine the content of the log generated by the SPM Log Synch job? (Choose three.)

  • A: Enable Risk Change log (1002)
  • B: Enable Authorization Logging (1100)
  • C: Retrieve System log (4004)
  • D: Retrieve OS Command log (4006)
  • E: Retrieve Audit log (4005)



Question 7
Your customer has created a custom transaction code ZFB10N by copying transaction FB10 and implementing a user exit. 
How can you incorporate the customer enhancement into the global rule set so that it will be available for Risk Analysis?

  • A: Update security permissions in all relevant authorization objects, maintain the custom program name in all relevant functions, and generate the access rules.
  • B: Update all relevant functions with ZFB10N, maintain the permission values for all relevant authorization objects, and generate the access rules.
  • C: Update all relevant functions with ZFB10N, maintain the permission values in the relevant access risk, and generate the global rule set.
  • D: Update the relevant access risk with ZFB10N, maintain access rules in all relevant functions, and generate the global rule set.



Question 8
What is the purpose of role mining?

  • A: To consolidate roles by taking actions after running comparisons.
  • B: To compare authorizations by merging roles during the back-end synchronization.
  • C: To consolidate authorizations by merging roles in one step.
  • D: To compare roles by running back-end synchronizations.



Question 9
Which of the following attributes are mandatory when creating business role definition details in Business Role Management? (Choose three.)

  • A: Functional Area
  • B: Company
  • C: Landscape
  • D: Project Release
  • E: Application Type



Question 10
What information is available in the audit trail log for access rules? (Choose two.)

  • A: Which terminal ID the change was made from
  • B: When the change was made
  • C: Who made the change
  • D: Who approved the change








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset