GRC
GRC
performing a
risk analysis? (Choose two)?
A. Configure organization rules for each relevant function
B. Update the functions that contain each relevant action by activating the fields for the required
permissions and maintaining a value for each specific organization
C. Configure organization rules for each relevant risk
D. Update the functions that contain each relevant action by activating the fields for the required
permissions
E. Configure organization level system parameters to incorporate all organization levels for each
relevant risk
Answer: C,D
5. What do you mitigate using Access Control?
A. Roles
B. Users
C. Risks
D. Functions
Answer: C
6. Your customer wants a manager to fulfill both MSMP workflow agent purposes.
How do you configure this?
A. Maintain the manager agent twice, once for each purpose, using the same agent ID
B. Maintain the manager agent once and assign both purposes to it without using an agent ID
C. Maintain the manager agent twice, once for each purpose, using different agent IDs
D. Maintain the manager agent once and assign both purposes to it using the same agent ID
Answer: C
7. You have identified some risks that need to be defined as cross-system risks. How do you
configure your system to enable cross-system risk analysis?
A. 1. Set the analysis scope of the function to cross-system
2. Create cross-system type connectors
3. Assign the corresponding connectors to the appropriate connector group
4. Generate rules
B. 1. Set the analysis scope of the risk to cross-system
2. Create cross-system type connectors
3. Assign the corresponding connectors to the appropriate connector group
4. Generate rules
C. 1. Set the analysis scope of the risk to cross-system
2. Create a cross-system type connector group
3. Assign the corresponding connectors to the connector group
4. Generate rules
13. Which report types require the execution of batch risk analysis? (Choose two)?
A. Ad-hoc risk analysis reports
B. Offline risk analysis reports
C. User level simulation reports
D. Access rules detail reports
E. User and role analysis dashboards
Answer:B,E
14. Where can you define a mitigating control? (Choose three)?
A. In the mitigating controls workset in Access Control
B. In the rule setup in Access Control
C. In the Access Control risk analysis result screen
D. In the central process hierarchy in Process Control
E. In the activity setup in Risk Management
Answer:A,C,D
15. You have created a new end-user personalization (EUP) form. Where can you make use of this EUP
form? (Choose two)?
A. In a stage configuration of a workflow
B. In an organizational assignment request
C. In a template-based request
D. In a model user request
E. Company 2
Answer: A, C
16. You have maintained an end-user personalization (EUP) form and set a particular field as
mandatory. Which additional field attribute settings are required? (Choose two)?
A. The field attribute Visible must be set to "Yes"
B. A default value must be maintained for the field
C. The field attribute Editable must be set to "Yes"
D. The field attribute Visible must be set to "No"
E. The field attribute Editable must be set to "No"
Answer: A, C
17.You want to maintain roles using Business Role Management. How do you import the roles from
the back-end system?
A. Use an SAP transport
B. Execute the Role Import background job directly in the back-end system