Question 1
Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? Note: There are 2 correct Answers to this question.
                        
                    
                    Question 2
Which of the following defines "Phishing"?
                        
                    
                    Question 3
What is the main purpose of SAP Access Control, as an enterprise software solution?
                        
                    
                    Question 4
SAP Cloud Identity and Access Governance consists of which of the following software services? Note: There are 3 correct answer to this question.
                        
                    
                    Question 5
Which of the following are examples of personal data under the GDPR? Note: There are 3 correct Answers to this question.
                        
                    
                     
            