SAP - Big Savings Alert – Don’t Miss This Deal - Ends In 1d 00h 00m 00s Coupon code: 26Y30OFF
  1. Home
  2. SAP
  3. C_GRCAC_13 Exam
  4. Free C_GRCAC_13 Questions

Free Practice Questions for SAP C_GRCAC_13 Exam

Pass4Future also provide interactive practice exam software for preparing SAP Certified Application Associate - SAP Access Control 12.0 (C_GRCAC_13) Exam effectively. You are welcome to explore sample free SAP C_GRCAC_13 Exam questions below and also try SAP C_GRCAC_13 Exam practice test software.

Page:    1 / 14   
Total 80 questions

Question 1

When would it be necessary to define a subsequent connector? Note: There are 2 correct answers to this question.



Answer : C, D

According to the SAP wiki, you need to define a subsequent connector in two scenarios: when all resources are not available on a specific connector and when you are defining a cross system risk. A subsequent connector is a connector that is used to perform additional checks or actions after the main connector has been processed. For example, if a role contains transactions from different systems, you need to define a subsequent connector for each system. If a risk involves transactions from different systems, you need to define a subsequent connector for each system.


Question 2

Which of the following allows you to control how many access requests can be active for a user and a system at the same time?



Answer : A

According to the SAP wiki, you can use parameter configuration to control how many access requests can be active for a user and a system at the same time. Parameter configuration allows you to customize the SAP Access Control solution by setting various parameters and their values. For example, you can use parameter 4000 Maximum Number of Requests per User per System to limit the number of requests that a user can have for a system.


Question 3

You are tasked with configuring SAP Access Control to retrieve user and authentication information. SAP Access Control supports a connector configuration for which of the following functions? Note: There are 2 correct answers to this question.



Answer : B, C

According to the SAP Help Portal1, SAP Access Control supports a connector configuration for User Authentication Data Source data type IDM and User Detail Data Source data type SU01. These data types are used to retrieve user and authentication information from different sources such as SAP Identity Management (IDM) or SAP User Management (SU01).End User Verification SU01 is not a valid data type, and User Search Data Source data type HR is used to search for users in SAP Human Resources (HR) system, not to retrieve user and authentication information. Reference:1https://help.sap.com/docs/connectivity/sap-btp-connectivity-cf/configure-access-control-tcp?locale=en-us


Question 4

In the SAP GRC landscape, which of the following activities must be taken to ensure that an update to the access risk rule set in the development system will be available for risk analysis in the production system? Note: There are 2 correct answers to this question.



Answer : B, D

According to the SAP Blogs1, one of the methods to ensure that an update to the access risk rule set in the development system will be available for risk analysis in the production system is to download the access risk rules from the development system and upload them into the production system using GRAC_DOWNLOAD_RULES and GRAC_UPLOAD_RULES transactions. Therefore, D is a correct answer. Another method is to generate and insert the access risk rules into the corresponding tables in the production system using GRAC_GENERATE_RULES transaction. Therefore, B is also a correct answer.A and C are not valid activities for updating the access risk rule set, as they are related to connector configuration and transport management, respectively. Reference:1https://blogs.sap.com/2014/04/21/download-modify-and-upload-the-access-risk-analysis-rule-set-in-sap-access-control-10x/


Question 5

Business Role Management provides which of the following capabilities? Note: There are 3 correct answers to this question.



Answer : A, C, D

According to the SAP Blogs1, Business Role Management provides several capabilities for managing roles in SAP Access Control. Some of these capabilities are: Facilitate role creation at the function level (A), Align role definitions with business processes , and Standardize methodology for role assignment (D). These capabilities help to simplify and automate the role design and maintenance process. Therefore, A, C and D are the correct answers.B and E are not valid capabilities of Business Role Management, as they are related to other scenarios, such as Role Certification and Emergency Access Management. Reference:1https://blogs.sap.com/2019/03/14/sap-access-control-12-role-certification/


Page:    1 / 14   
Total 80 questions