Question 86
What are the 2 main options to create and save audit filters?
Question 87
Which authorization object is needed to execute external commands?
Question 88
Which transaction allows you to approve a transport request?
Question 89
How is it called when programs can be written that modify the IP address of the source of the TCP/IP packet, to fool the network into thinking that the packet is coming from within the network.
Question 90
What are the return codes after the authorization check with the ABAP object authoritycheck?