C Grcac 12

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

SAP

C_GRCAC_12
SAP Certified Application Associate - SAP Access Control
12.0
QUESTION & ANSWERS

https://www.certificationsprep.com/C_GRCAC_12-exam-questions.html
QUESTION 1

What can you use a custom end-user personalization configuration for? Note: There are 3 correct
answers to this question.
A. To assign it to the standard access request
B. To assign it to an access request template
C. To restrict a user's ability to approve their own requests
D. To determine fields shown in a workflow item
E. To determine roles that can be assigned on a request

Correct Answer: A,B,D

QUESTION 2

Which of the following items are mandatory for creating an access request template? Note: There are
2 correct answers to this question.
A. End user personalization
B. Template description
C. Request type
D. Request description

Correct Answer: A,C

QUESTION 3

How can you make sure that a risk analysis is performed when you use access request management?
Note: There are 2 correct answers to this question
A. Set Enable Offline Risk Analysis parameter to Yes
B. Configure the MSMP workflow stage to require a risk analysis
C. Configure the MSMP workflow path to require a risk analysis
D. Set the Enable Risk Analysis Form on Submission parameter to Yes

Correct Answer: B,D

QUESTION 4

Which of the following are required to enable Centralized Emergency Access Management (EAM)?

https://www.certificationsprep.com/C_GRCAC_12-exam-questions.html
Note: There are 2 correct answers to this question
A. Set the Application Type parameter for Emergency Access Management to value ID in the target
system UGRC plug-in
B. Set the Application Type parameter for Emergency Access Management to value ID in SAP Access
Control
C. Set the Enable Decentralized Firefighting parameter for Emergency Access Management to YES
D. Set the Enable Decentralized Firefighting parameter for Emergency Access Management to NO

Correct Answer: A,B

QUESTION 5

SAP developed a three phase, six step SoD Risk Management Process for use when implementing
Access Risk
Analysis.
Which of the following steps are a part of this process?
Note: There are 3 correct answers to this question.

A. Risk Recognition
B. Mitigation
C. Analysis
D. Role Building and Analysis
E. Rule Set Design

Correct Answer: A,B,C

QUESTION 6

Which of the following activities can you do in Emergency Access Management (EAM)? Note: There
are 2 correct answers to this question
A. Log on to the Firefighter ID directly with a password
B. Maintain EAM master data in the back-end system
C. Display a log file of performed activities
D. Perform tasks outside of the normal responsibilities

Correct Answer: C,D

https://www.certificationsprep.com/C_GRCAC_12-exam-questions.html
QUESTION 7

Which of the following reviewer options does SoD Review support?


A. Manager and Role Owner
B. Manager or Role Owner
C. Manager and Risk Owner
D. Manager or Risk Owner

Correct Answer: B

https://www.certificationsprep.com/C_GRCAC_12-exam-questions.html

You might also like