Saturday 5 September 2015

SAP Security Online Quiz Questions And Answers

16. With reference to the LDAP directory, and the UME, which of the following are true?

A. The LDAP directory can either be connected as a read-only data source or as a writeable data source
B. The UME can support Users as a tree or a Flat hierarchy
C. The Distinguished Names (DNs) of user and group objects must not be longer than 240 characters.
D. If you are using an LDAP directory with a deep hierarchy, you can assign users or groups as members of another group using the UME user administration tools.
Ans: A

17. You have a mixed system landscape including both SAP and non-SAP systems, or you have an existing corporate LDAP directory in your system landscape. User management data is stored in a combination of an LDAP server and a database. Which of the following data is written to and read from the IDAP server?
A. Additional data (for example, information about when a user was last changed)
B. Other principal types (for example, roles)
C. Groups (displayname, description, uniquename, and the group members)
D. User accounts (logonid, password, ID of the assigned user)
Ans: C

18. The LDAP Connector is called using ABAP functions and communicates with the directory server using the Lightweight Directory Access Protocol (LDAP). The connection with the directory server can be created with various analysis methods, such as simple binding or anonymously.
The above statement is:
A. True
B. False
Ans: A

19. The User Management Engine (UME) allows you to define a security policy, with reference to this, which of the following statements are true?
A. The number of failed logon attempts after which a user is locked, is defined in the security policy.
B. The UME security policy is independent of the security policy of the UME data source
C. You can define a security policy for the UME that is the same or stronger than the corresponding security policy in the backend system.
Ans: B


20. What are the best practices for establishing a connection type Establishing Trust for Server-Sideauthentication?
A. Generate the key pair on the server component.
B. Use a public-key certificate that is signed and issued by a CA
C. Make sure the client components trust the issuing CA.
D. It is necessary for the server to verify the identity of the client component
Ans: A,B,C

More Questions & Answers:-
Page1 Page2 Page3 Page4 

No comments:

Post a Comment