最新的 SAP Certified Technology Professional P-SECAUTH-21 免費考試真題 (Q129-Q134):
問題 #129 Which measures should we implement to protect the PSEs? Note: There are 2 correct answers to this question
A. Restrict access to the opposing system users
B. Encyrpt the files with the transaction SNCO
C. Review the usage of the SADMIFCD object
D. Review the usage of the S_DATASET object
答案:A,D 問題 #130 What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.
A. They have an unconfigurable validity of 2 minutes
B. They are used for user-to-system trusted login
C. They are used for system-to-system communication
D. They are transmitted as cookies
答案:A,C 問題 #131 How can you protect a table containing sensitive data using the authorization object STABUDIS?
A. Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables
B. The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.
C. The tables containing sensitive data must be named using the authorization object STA BUNAM for all responsible administrator employees. The fields DICBERCLS of the object STABUDIS can then be filled with *.
D. The tables containing sensitive data must be associated with table groups in table TBRG.
答案:A 問題 #132 For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA system? Note: There are 2 correct answers to this question.
A. To protect the X.509 public key infrastructure certificates
B. To store the secure single sign-on configuration
C. To store root keys for data volume encryption
D. To protect the password of the root key backup
答案:B,C 問題 #133 What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.
A. Configuration check of the SAP systems and the SAP middleware components against defined configurations
B. Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability
C. Results with recommendations on how to resolve identified vulnerabilities without prioritization
D. Analysis of security vulnerabilities within an enterprise's SAP landscape to ensure optimal protection against intrusions