Question 46

Which feature is available in the CommonCryptoLib scenario provided by SAP Security Library?
  • Question 47

    Which of the following actions are correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
    Note: There are 2 correct answer to this question.
  • Question 48

    Which of the following are examples of personal data under the GDPR? Note: There are 3 correct Answers to this question.
  • Question 49

    Which of the following are used in SAP Enterprise Threat Detection ( ETD) architecture? Note: There are 2 correct answer to this question.
  • Question 50

    Which of the following accurately describe a Composite Role? Note: There are 2 correct answer to this question.