Question 1
Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? Note: There are 2 correct Answers to this question.
Question 2
Which of the following defines "Phishing"?
Question 3
What is the main purpose of SAP Access Control, as an enterprise software solution?
Question 4
SAP Cloud Identity and Access Governance consists of which of the following software services? Note: There are 3 correct answer to this question.
Question 5
Which of the following are examples of personal data under the GDPR? Note: There are 3 correct Answers to this question.