Get started Bring yourself up to speed with our introductory content.

Answers to a SearchSAP.com quiz: Best practices in SAP security

Looking for a cheat sheet to SearchSAP.com's quiz: Best practices in SAP security? ead answers and get detailed information on all related topics, including authorizations, user IDs, passwords, defaults and security transactions.

Here you'll find answers to a SearchSAP.com quiz: Best practices for SAP security

Send your score to lhoyt@techtarget.com for a chance to win a free book!

Correct answers:

Question #1: B
Why? Click here for detailed explanation!

Question #2: A
Why? Click here for detailed explanation!

Question #3: B
Why? Click here for detailed explanation!

Question #4: B
Why? Click here for detailed explanation!

Question #5: A
Why? Click here for detailed explanation!

Question #6: B
Why? Click here for detailed explanation!

Question #7: A
Why? Click here for detailed explanation!

Question #8: B
Why? Click here for detailed explanation!

Question #9: C
Why? Click here for detailed explanation!

Question #10: A
Why? Click here for detailed explanation!

Question #11: B
Why? Click here for detailed explanation!

Question #12: C
Why? Click here for detailed explanation!

Question #13: B
Why? Click here for detailed explanation!

Question #14: A
Why? Click here for detailed explanation!

Question #15: A
Why? Click here for detailed explanation!

* Alright, that's enough cheating! Go back to the QUIZ!
* Learn more about SAP and application security in SearchSAP.com's Application Security Learning Guide.
* Looking for even information on SAP security? Check out SearchSAP.com's security topic center.

Dig Deeper on SAP security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchERP

SearchOracle

SearchDataManagement

SearchAWS

SearchBusinessAnalytics

SearchContentManagement

SearchHRSoftware

Close