P_SECAUTH_21 – SAP Certified Technology Professional – System Security Architect Sample Questions

  1. Home
  2. P_SECAUTH_21 – SAP Certified Technology Professional – System Security Architect Sample Questions
P_SECAUTH_21 - SAP Certified Technology Professional - System Security Architect Sample Questions

The P_SECAUTH_21 SAP Certified Technology Professional – System Security Architect Exam was developed to evaluate a candidate’s skills in the areas of SAP System Security and Authorization. The candidate can show that they have the necessary in-depth knowledge of SAP System Security and Authorization by completing the “SAP Certified Technology Professional – System Security Architect” certification exam. This certification indicates the candidate’s in-depth understanding of the Technology Consultant profile, their capacity to put these skills to practical use, and their ability to provide guidance while acting in the role of a SAP Security Architect during the execution of SAP projects.  The article provides a list of P_SECAUTH_21 – SAP Certified Technology Professional – System Security Architect Sample Questions that cover core exam topics including –,

  • Domain 1 – Overview of Authorization Concept for SAP S/4HANA (> 12%)
  • Domain 2 – Overview of Authorization, Security and Scenarios in SAP HANA (> 12%)
  • Domain 3 – Overview of SAP Netweaver Application Server and Infrastructure Security (> 12%)
  • Domain 4 – Overview of Security Monitoring and Security Auditing (> 12%)
  • Domain 5 – Overview of Authorization Concept for SAP Business Suite (8% – 12%)
  • Domain 6 – Overview of Secure an SAP System (8% – 12%)
  • Domain 7 – Overview of SAP Cloud Platform Security (8% – 12%)
  • Domain 8 – Overview of Access Governance and Compliance in SAP (< 8%)
  • Domain 9 – Overview of User Administration and Identity Lifecycle Management in SAP (< 8%)

Q1)Transports entering your SAP system are not currently automatically scan. You have set up a virus scanner using a script to automatically scan for harmful programmes in order to prevent the import of insecure apps. What legal file format are data files transform to before being examined by a virus scanner?

  • a) SAR
  • b) TXT
  • c) CSV
  • d) XML

Correct Answer: b

Documentation: TXT – Enter Comment

Q2)You are introducing structural authorizations for your users in your SAP HCM system. What features define this authorization type?

  • a) The Profile Generator is use to preserve the structural profile and assign it to users.
  • b) The Implementation Guide is use to maintain and assign users to the structural profile.
  • c) The structural profile determines the user’s access mode;
  • d) The structural profile determines the organisational structure’s accessible objects.

Correct Answer: b and d

Documentation: Distribute Documents and letters using SAP Payroll & SAP SuccessFactors data

Q3)On the HANA database, a system user established a User1 and a schema with some data. User2 needs access to the objects in User1’s schema in order to construct modelling views. What should be done?

  • a) User2 needs to be give with the same roles like User1
  • b) User1 should grant _SYS_REPO with SELECT WITH GRANT privilege
  • c) ROLE ADMIN needs to be granted to User2
  • d) System user should grant User2 with SELECT privilege to User1 schema

Correct Answer: d

Documentation: Users, Privileges, and Schemas

Q4)In SAP NetWeaver ABAP-based systems, the activity “Send User Name and Password” is the first step in the password authentication process, and the activity “Authenticate” is the last. What should be done between these two phases in what order?

  • a) Calculate hash function (pwd) in Application Server, Check Code Conversion and Compare hash stored in USR02
  • b) Check Code Conversion, Calculate hash function (pwd) in Application Server and Compare hash stored in USR02
  • c) Compare hash stored in USR02, Check Code Conversion and Calculate hash function (pwd) in Application Server
  • d) Calculate hash function (pwd) in Application Server, Compare hash stored in USR02 and Check Code Conversion

Correct Answer: b

Q5)What qualifies the pre-delivered “system-local” package as a SAP HANA repository component?

  • a) It may be allocate to a delivery unit.
  • b) The SAP HANA live content is store in it as a container.
  • c) Development testing is done with it.
  • d) The SAP HANA Interactive Education is include (SHINE)

Correct Answer: C

SAP Documentation: Using the SAP HANA Repository

Q6)You are examining the views’ Core Data Services (CDS) authorizations. How do traditional authorizations and CDS authorizations integrate in P_SECAUTH_21?

  • a) By establishing access restrictions in a CDS view access role
  • b) By utilising the command AUTHORITY-CHECK in the CDS view’s access control
  • c) SU21 authorisation object definition of the CDS view
  • d) By incorporating the CDS view into the PFCG authorisation profile

Correct Answer: a

SAP Documenation: Core Data Services (CDS)

Q7)How can I find out when and by whom a profile was create or remove in P_SECAUTH_21?

  • a) Firstly, run report RSUSR008_009_NEW with appropriate filters
  • b) Also, check system trace using transaction ST01
  • c) Run report RSUSR100 with appropriate filters
  • d) Check security audit log using transaction SM20

Correct Answer: c

Q8)Your company has implemented CUA, and you wish to change the field distribution property to read as follows:
When a user is created, the central system should always have a default value that is immediately sent to the child systems. If you make changes to the data in the central or child system, it is only maintained locally after dissemination and is no longer distribute. Which distribution field parameter do you keep up with?

  • a) Proposal
  • b) Redistribution
  • c) Local
  • d) Global

Correct Answer:  a

SAP Documentation: Central User Administration (CUA)

Q9)When troubleshooting problems with the MSMP workflow, which transaction will be utilise to select the level of log category granularity to Multi Step Multi Process (MSMP) ID in P_SECAUTH_21?

  • a) GRFNMW_DEBUG
  • b) GRFNMW_ADMIN
  • c) GRFNMW_CONFIGURE_WD
  • d) GRFNMW_DEBUG_MSG

Correct Answer: d

Q10)What crucial attributes do catalogue roles in SAP HANA have in P_SECAUTH_21?

  • a) Catalog roles are transportable
  • b) Privilege revocation is transitive
  • c) _SYS_REPO needs to be grant privileges on data
  • d) Version management in place

Correct Answer: b

P_SECAUTH_21 - SAP Certified Technology Professional - System Security Architect free practice test
Menu