Question 46
Which feature is available in the CommonCryptoLib scenario provided by SAP Security Library?
Question 47
Which of the following actions are correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
Note: There are 2 correct answer to this question.
Note: There are 2 correct answer to this question.
Question 48
Which of the following are examples of personal data under the GDPR? Note: There are 3 correct Answers to this question.
Question 49
Which of the following are used in SAP Enterprise Threat Detection ( ETD) architecture? Note: There are 2 correct answer to this question.
Question 50
Which of the following accurately describe a Composite Role? Note: There are 2 correct answer to this question.