Which of the following activities can you do in Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.
According to the SAP Help Portal, you can perform two activities in Emergency Access Management: perform tasks outside of the normal responsibilities and display a log file of performed activities. Perform tasks outside of the normal responsibilities means that you can use a firefighter ID or a firefighter role to access a target system and perform emergency activities that require elevated authorizations. Display a log file of performed activities means that you can view the usage procedure log or the security audit log of a firefighting session.
Which of the following rule sets are delivered in SAP Access Control? Note: There are 3 correct answers to this question.
According to the SAP Help Portal, some of the rule sets that are delivered in SAP Access Control are GRAC_RA_RULESET_COMMON, GRAC_RA_RULESET_ERP, and GRAC_RA_RULESET_S4HANA. GRAC_RA_RULESET_COMMON contains common rule set definitions that are used by other rule sets. GRAC_RA_RULESET_ERP contains rule set definitions for SAP ERP systems. GRAC_RA_RULESET_S4HANA contains rule set definitions for SAP S/4HANA systems.
Which of the following SAP Access Control applications can be mapped to a BRFplus function? Note: There are 3 correct answers to this question.
According to the SAP Help Portal, you can map three SAP Access Control applications to a BRFplus function: triggers, initiators, and service level agreements. Triggers are events that initiate a workflow process. Initiators are conditions that determine the workflow path for a request. Service level agreements are rules that define deadlines and escalations for workflow stages.
When would it be necessary to define a subsequent connector? Note: There are 2 correct answers to this question.
According to the SAP wiki, you need to define a subsequent connector in two scenarios: when all resources are not available on a specific connector and when you are defining a cross system risk. A subsequent connector is a connector that is used to perform additional checks or actions after the main connector has been processed. For example, if a role contains transactions from different systems, you need to define a subsequent connector for each system. If a risk involves transactions from different systems, you need to define a subsequent connector for each system.
Business Role Management provides which of the following capabilities? Note: There are 3 correct answers to this question.