This page was exported from Valid Premium Exam [ http://premium.validexam.com ] Export date:Sun Nov 10 5:27:06 2024 / +0000 GMT ___________________________________________________ Title: Exam Questions Answers Braindumps C-GRCAC-13 Exam Dumps PDF Questions [Q26-Q49] --------------------------------------------------- Exam Questions Answers Braindumps C-GRCAC-13 Exam Dumps PDF Questions Download Free SAP C-GRCAC-13 Real Exam Questions SAP C-GRCAC-13 Exam Syllabus Topics: TopicDetailsTopic 1Maintain risks and critical access rules Activate Business Configuration (BC) setsTopic 2Guide customer to recognize and remediate risks Set up critical firefighting roles and assignments based on customer requirementsTopic 3Configure periodic review settings for periodic reviews, User Access Review, SoD Review Configure shared SAP Access Control settingsTopic 4Configure parameters for periodic access review requests Create mitigating controls and assignments based on customer requirementsTopic 5Set up SAP Access Control scheduled jobs Maintain paths and stages. Customize MSMP workflowTopic 6Configure provisioning and field mapping Maintain notification variables and templatesTopic 7Create and copy requests for user access and organizational assignments Synchronize objects in the SAP Access Control repositoryTopic 8Create BRFplus Applications for SAP Access Control Guide customer on how to monitor emergency accessTopic 9Configure Emergency Access Management settings Configure and monitor audit trailsTopic 10Define SAP Access Control workflow-related BRFplus rules Describe the SAP Governance, Risk and Compliance portfolio of solutions   NO.26 Which of the following must be specified when defining a mitigating control? Note: There are 2 correct answers to this question.  Organization  Risk Approver  Report  Mitigation Monitor NO.27 Risk Terminator provides the capability to execute a user level risk analysis for which of the following tools? Note: There are 2 correct answers to this question.  SCUA  PA30  SU01  PFCG NO.28 SAP Governance, Risk and Compliance solutions are organized along 4 key themes.Which of the following are key themes?Note: There are 3 correct answers to this question.  Business Integrity Screening  Access Governance  Cybersecurity and Data Protection  Enterprise Risk and Compliance  Audit Management NO.29 Which of the following conditions can you use to configure an escape route in MSMP Workflow? Note: There are 2 correct answers to this question.  No Role Owner  SOD Violation  Approver Not Found  Auto Provisioning Failure NO.30 Which of the following reviewer options does SoD Review support?  Manager and Role Owner  Manager or Role Owner  Manager and Risk Owner  Manager or Risk Owner NO.31 You are configuring a BRFplus flat rule and defining the attribute values for your Initiator rule conditions. You encounter the LINE_ITEM_KEY field. What value should you select for this field?  REQTYPE  ROLE_NAME  ITEMNUM  PRIORITY NO.32 You are maintaining the Mapping for Actions and Connector Groups activity in Customizing.Which of the following events should be mapped to the target development system as default when using Business Role Management?Note: There are 2 correct answers to this question.  Provisioning  Authorization Maintenance  Role Risk Analysis  Role Generation NO.33 Why might you integrate Business Role Management with Business Rules Framework? Note: There are 2 correct answers to this question.  Determine role owner  Determine role methodology  Determine role business area  Determine role naming convention NO.34 You want to generate a BRFplus Initiator Rule that utilizes an expression of type Decision Table for the SAP_GRAC_ACCESS_REQUEST MSMP Process ID.Which rule types can you use?Note: There are 2 correct answers to this question.  Class Based Rule  Function Module Based Rule  BRFplus Flat Rule  BRFplus Rule NO.35 Which of the following does Emergency Access Management support?  A user can only be assigned to a single Firefighter ID  Both role- and ID-based firefighting at the same time  A Firefighter ID can only be assigned to a single user  Both centralized and decentralized firefighting at the same time NO.36 Business Role Management provides the functionality to improve the role management process. Which of the following capabilities does it offer? Note: There are 2 correct answers to this question.  Replacement of the PFCG role management transaction  Management of role definition transports  Enforcement of consistency in naming conventions  Identification of duplicate roles NO.37 Which of the provisioning types can be used with Auto-Provisioning? Note: There are 2 correct answers to this question.  Direct provisioning  Indirect provisioning  Manual provisioning  Global provisioning NO.38 You want to configure SAP Access Control to generate alerts to help manage compliance. What are the available alert capabilities that can be configured? Note; There are 3 correct answers to this question.  Identify a user who has executed a critical action and generate an email notification  Identify a user who has executed conflicting functions and open a support desk message  Identify a user who has executed conflicting functions  Identify a control monitor who has failed to execute defined reports in a timely fashion  Identify a user who has executed a critical action and open a support desk message. NO.39 Which of the following is a prerequisite for scheduling a Role Usage Sync in SAP Access Control?  BOM Data Sync  Authorization Sync  IdM/IAG Role Import  Action Usage Sync NO.40 Which of the following activities can you do in Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.  Log on to the Firefighter ID directly with a password  Maintain EAM master data in the back-end system  Display a log file of performed activities  Perform tasks outside of the normal responsibilities NO.41 You are updating the configuration of a stage detail during maintenance of your MSMP Workflow configuration. You want to apply the updated configuration to both new and existing requests that are to be processed at the specified stage. Which configuration setting allows you to do this?  RT Config Change OK  All Roles in Request (Re-evaluate)  Reroute  Display Review Screen NO.42 Which of the following Business Configuration (BC) sets configure a connector group in SAP Access Control? Note: There are 3 correct answers to this question  GRAC_ACCESS_REQUEST_APPL_MAPPING  GRAC_RA_RULESET_BASIS  GRAC_RA_RULESET_COMMON  GRAC_ROLE_MGMT_LANDSCAPE  GRAC_RA_RULESET_PSOFT NO.43 Which of the following logs can be collected for an Emergency Access Management session? Note: There are 3 correct answers to this question.  Audit log  System log  Change log  GRC Audit log  Application log NO.44 Which of the following reviewer options does User Access Review support?  Manager or Risk Owner  Manager or Role Owner NO.45 Which of the following are functions of the SAP Access Control Solution? Note: There are 3 correct answers to this question.  Compliance Certification Sign-Off  Privilege Monitoring  Risk Response  Role Provisioning  Risk Analysis NO.46 Which of the following items are mandatory for creating an access request template? Note: There are 2 correct answers to this question.  End user personalization  Template description  Request type  Request description NO.47 Which of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.  Set the Application Type parameter for Emergency Access Management to value ID in the target system UGRC plug-in  Set the Application Type parameter for Emergency Access Management to value ID in SAP Access Control  Set the Enable Decentralized Firefighting parameter for Emergency Access Management to YES  Set the Enable Decentralized Firefighting parameter for Emergency Access Management to NO NO.48 Which of the following are prerequisites for implementing Emergency Access Management? Note: There are 2 correct answers to this question.  Users and roles that are used for firefighting activities have been created for the SAP Access Control V D system  The repository object sync must be completed.  Implementation of a user exit on the SAP Access Control system to prevent direct logon with the Firefighter ID  Users and roles that are used for firefighting activities have been created in the target system NO.49 Your compliance team requires that all changes to access rules be tracked. Which of the following change logs do you enable? Note: There are 3 correct answers to this question.  Role  Access Rule  Function  Rule Set  Critical Role  Loading … Latest SAP C-GRCAC-13 Real Exam Dumps PDF: https://www.validexam.com/C-GRCAC-13-latest-dumps.html --------------------------------------------------- Images: https://premium.validexam.com/wp-content/plugins/watu/loading.gif https://premium.validexam.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-04-19 16:22:10 Post date GMT: 2023-04-19 16:22:10 Post modified date: 2023-04-19 16:22:10 Post modified date GMT: 2023-04-19 16:22:10