This page provides you with the real and most updated / latest Certification Question with Correct Answers for the System Security Architect (P_TSEC10_75). We at ERPKITE providing these questions for free to all the SAP certification candidate to showcase the quality of the question prepared by our SAP subject experts.

 

We have developed an advanced methodology to prepare for the SAP SSA (P_TSEC10_75) exam to make it easy for anyone to pass the SAP P_TSEC10_75 certification and be certified on the System Security Architect. The methodology is practice to learn, as the memory principle and many deep research suggest, the practice could lead to a very long-lasting memory.

 

Highly Recommended Practice test: SAP SSA PRACTICE TEST
Complete Syllabus: SAP P_TSEC10_75 Syllabus

 

SAP SSA (P_TSEC10_75) Free Sample Questions

Question: 1

What are the 3 steps to install the PAS?

A. Install SAP package ntauth.sar
B. Set the Service file parameters
C. Maintain user mapping. Maintain table USREXTID Report (RSUSREXTID)

D. user must accept session cookies

Question: 2

What are the 2 profile parameters used to configure sso with sap logon tickets?

A. Login/create_sso2_ticket
B. Login/accept_sso2_ticket

C. Login/accept_sso3_tick

Question: 3

How do you protect access to the ITS service and template files?

A. Using groups at the operating system level
B. Using groups at the creation dolmen level

Question: 4

Which command displays all connections and listening ports on your computer?

A. netstat –a
B. netstat –b
C. netstat –c

Question: 5

How is a system (or a combination of systems) called that protects a networked system from unauthorized or unwelcome access?

A. A firewall
B. B firewall
C. F firewall

Question: 6

What is the interface of web based information for enduser

A. RFC, Remote function call
B. The ITS, Internet Transaction Server
C. The SAP Web-GUI

Question: 7

Which protocol is used between the SAP GUI and the Server?

A. DEDG Protocol
B. DIAG Protocol

Question: 8

How is it called when programs can be written that modify the IP address of the source of the TCP/IP packet, to fool the network into thinking that the packet is coming from within the network.

A. Buffer
B. Overflow
C. Spoofing

Question: 9

What are the 3 standards approval steps and their authorization object, value and default value?

A. By request owner
B. By user department
C. By system administrator
D. By user administrator

Question: 10

Which table maps the Authorization Group to a list of tables?

A. TDDAT
B. TPPDE
C. RTYRA

If you have any feedback, pl send us on hello@erpkite.com