GRC 12

GRC 12

GRC 12


Fichier Détails

Cartes-fiches 80
Langue English
Catégorie Informatique
Niveau Autres
Crée / Actualisé 14.10.2021 / 18.05.2023
Lien de web
https://card2brain.ch/cards/20211014_grc_12?max=40&offset=40
Intégrer
<iframe src="https://card2brain.ch/box/20211014_grc_12/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Which of the following does Emergency Access Management support?

Which of the following are Service Level Agreement time frame options? Note: There are 2 correct^answers to this question.

Which of the following are prerequisites for implementing Emergency Access Management? Note: There are 2 correct answers to this question.
 

SAP Access Control delivers multiple applications that can be mapped to BRFplus functions. Which of the following applications can be mapped to a BRFplus function? Note: There are 3 correct answers to this question.

Which of the following must be specified when defining a mitigating control? Note: There are 2
correct answers to this question.

Which of the following reviewer options does User Access Review support?

You want to configure SAP Access Control to generate alerts to help manage compliance. What are the available alert capabilities that can be configured? Note; There are 3 correct answers to this question.

Which of the following are features of a business role in SAP Access Control? Note: There are 2 correct answers to this question.

Which of the following logs can be collected for an Emergency Access Management session? Note: There are 3 correct answers to this question.

You want to use the User Analysis Dashboard to evaluate Segregation of Duties violations after your most recent batch risk analysis has completed. However, when reviewing the data you realize that the dashboard does not display all of your current users. What do you need do to correct the problem?

It is mandatory for a Firefighter ID to be assigned to which of the following?

Which of the following tasks can you complete using the Role Certification process? Note: There are 2 correct answers to this question.

Why might you integrate Business Role Management with Business Rules Framework? Note: There are 2 correct answers to this question.

Which of the following is a prerequisite for scheduling a Role Usage Sync in SAP Access Control?

Risk Terminator provides the capability to execute a user level risk analysis for which of the following tools? Note: There are 2 correct answers to this question.

You want to configure Password Self Service (PSS) to allow your end users to easily reset their password and process changes to their name.
Which of the following actions are required before PSS can be used?

You are defining connector settings for the connector between your SAP Access Control system and your SAP S/4HANA system.
Which of the following integration scenarios should you configure?
Note: There are 2 correct answers to this question.

You are configuring your MSMP Workflow path and you want to allow an approver to decide which type of provisioning should occur upon approval. Which configuration options provide this capability? Note: There are 2 correct answers to this question.

What can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.

You are maintaining an initiator rule in MSMP Workflow. Which of the following must you specify?

SAP developed a three phase, six step SoD Risk Management Process for use when implementing Access RiskAnalysis. Which of the following steps are a part of this process?
Note: There are 3 correct answers to this question.

Which of the following represent a valid Rule Kind when configuring MSMP Workflow? Note: There are 2 correct answers to this question.

You are updating the configuration of a stage detail during maintenance of your MSMP Workflow configuration. You want to apply the updated configuration to both new and existing requests that are to be processed at the specified stage. Which configuration setting allows you to do this?

Which of the following Business Configuration (BC) sets configure a connector group in SAP Access Control? Note: There are 3 correct answers to this question

Which of the provisioning types can be used with Auto-Provisioning? Note: There are 2 correct
answers to this question.

Which component delivers SAP Access Control functionality in SAP GRC 12.0?

You are tasked with configuring SAP Access Control to retrieve user and authentication information. SAP Access Control supports connector configuration for which of the following functions? Note: There are 3 correct answers to this question.

When is it necessary to define subsequent connectors?

Which of the following rule sets are delivered standard in SAP Access Control 12.0?

Note: There are 3 correct answers to this question.

Which of the following SAP functionalities can you use to calculate rule results when configuring MSMP Workflow? Note: There are 2 correct answers to this question.

What are condition groups used for in Business Role Management? Note: There are 2 correct
answers to this question.

You want to use Access Request Management to provision access in a target system.
Which of the following actions are required before access can be provisioned using an access
request? Note: There are 2 correct answers to this question.

Which of the following are required to enable Centralized Emergency Access Management (EAM)?
Note: There are 2 correct answers to this question

Which component plug-in contains SAP Access Control functions for non-HR SAP systems?

You want to create an Initiator rule in BRFplus for the standard access request. Which structures provide the attributes that you can use to define your rule? Note: There are 2 correct answers to this question.

The GRAC_REPOSITORY_OBJECT_SYNC program is used to synchronize which of the following types of data from your target system?
Note: There are 3 correct answers to this question.

Which of the following solutions are installed with SAP GRC 12.0? Note: There are 3 correct answers to this question.

You want approver authentication when approving an access request. Which MSMP Workflow stage configuration option can you use?

You are implementing Access Request Management.
Which integration scenarios should you assign to the target connector?

Which of the following conditions can you use to configure an escape route in MSMP Workflow?
Note: There are 2 correct answers to this question.