Upload Button Icon Add office photos

Filter interviews by

GEBBS TECHNOLOGIES SAP Security Consultant Interview Questions and Answers

Updated 8 May 2024

GEBBS TECHNOLOGIES SAP Security Consultant Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - Technical 

(1 Question)

  • Q1. Technical question
Round 2 - HR 

(2 Questions)

  • Q1. Salary structure and basics
  • Q2. Notice period should give
Round 3 - HR 

(1 Question)

  • Q1. Nothing more to tell

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What are the key considerations for implementing S/4HANA?
  • Q2. What real-time issues have you encountered during upgrades?
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Recruitment Consulltant and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about your self
  • Q2. What is Sap Security

Interview Preparation Tips

Interview preparation tips for other job seekers - NA
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. How do you compare roles in quality and production?
  • Q2. Difference between manually and maintained in Authorization data in role?
  • Ans. 

    Manually maintained authorization data in a role is added directly by the user, while maintained data is managed through authorization objects.

    • Manually maintained data is added directly by the user in the role maintenance transaction (PFCG).

    • Maintained data is managed through authorization objects which are predefined and assigned to roles.

    • Manually maintained data can be customized and specific to individual requirement...

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What are critical Authorization objects in security
  • Ans. 

    Critical Authorization objects are essential for controlling access to sensitive data and functions within SAP systems.

    • S_USER_AUTH - User authorization object for user maintenance

    • S_PROGRAM - Authorization object for executing programs

    • S_TABU_DIS - Table maintenance authorization object

    • S_TCODE - Transaction code authorization object

    • S_RFC - Remote function call authorization object

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. SAP SECURITY and what is the use of this
  • Ans. 

    SAP Security involves protecting SAP systems from unauthorized access and ensuring data integrity.

    • SAP Security involves setting up user roles and authorizations to control access to sensitive data

    • It includes implementing security measures such as encryption, authentication, and monitoring

    • Regular security audits and updates are essential to maintain a secure SAP environment

  • Answered by AI
  • Q2. WHAT IS GRC AND WHY USE THIS
  • Ans. 

    GRC stands for Governance, Risk, and Compliance. It is used to manage regulations and policies within an organization.

    • GRC helps organizations align their operations with regulatory requirements and internal policies.

    • It provides a framework for managing risks and ensuring compliance with laws and regulations.

    • GRC solutions often include tools for policy management, risk assessment, and compliance monitoring.

    • Examples of G...

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
Not Selected
Round 1 - Technical 

(1 Question)

  • Q1. Difference between service user and dialog user in FFID
  • Ans. 

    Service user is used for background processing, while dialog user is used for interactive processing in FFID.

    • Service user is used for background processing tasks that do not require user interaction.

    • Dialog user is used for interactive processing tasks that require user input.

    • Service user can be used for automated jobs like data imports, whereas dialog user is used for manual transactions.

    • Service user typically has high...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Steps of an implementation project
  • Ans. 

    Implementation project steps involve planning, design, configuration, testing, deployment, and support.

    • 1. Planning phase involves defining project scope, objectives, and timelines.

    • 2. Design phase includes creating a blueprint for the solution based on requirements.

    • 3. Configuration phase involves setting up the system according to the design.

    • 4. Testing phase includes various types of testing like unit, integration, and ...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.

Round 1 - Aptitude Test 

Basic math, Which can be cracked by ant btech students but have a bit of analystics

Round 2 - Coding Test 

Basic python codes which are not related to sap

Round 3 - Technical 

(2 Questions)

  • Q1. Mostly on resume
  • Q2. And the projects i workedon
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Recruitment Consulltant and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about Your self
  • Ans. 

    Experienced SAP Security Consultant with a strong background in implementing and maintaining security measures for SAP systems.

    • Over 5 years of experience in SAP security consulting

    • Proficient in designing and implementing security roles and authorizations

    • Skilled in conducting security assessments and audits

    • Strong knowledge of SAP security best practices

    • Excellent communication and problem-solving skills

  • Answered by AI
  • Q2. Basic questions on SAP Security

Interview Preparation Tips

Interview preparation tips for other job seekers - NA

GEBBS TECHNOLOGIES Interview FAQs

How many rounds are there in GEBBS TECHNOLOGIES SAP Security Consultant interview?
GEBBS TECHNOLOGIES interview process usually has 3 rounds. The most common rounds in the GEBBS TECHNOLOGIES interview process are HR and Technical.
What are the top questions asked in GEBBS TECHNOLOGIES SAP Security Consultant interview?

Some of the top questions asked at the GEBBS TECHNOLOGIES SAP Security Consultant interview -

  1. Technical quest...read more
  2. Nothing more to t...read more

Tell us how to improve this page.

GEBBS TECHNOLOGIES SAP Security Consultant Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

GEBBS TECHNOLOGIES SAP Security Consultant Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-life balance

4.0

Salary

4.0

Job security

4.0

Company culture

3.0

Promotions

4.0

Work satisfaction

Explore 1 Review and Rating
Software Engineer
17 salaries
unlock blur

₹2.5 L/yr - ₹11.8 L/yr

Devops Engineer
13 salaries
unlock blur

₹4 L/yr - ₹9.5 L/yr

Software Developer
7 salaries
unlock blur

₹4.5 L/yr - ₹6 L/yr

Softwaretest Engineer
7 salaries
unlock blur

₹3.5 L/yr - ₹7.2 L/yr

Consultant
5 salaries
unlock blur

₹7.6 L/yr - ₹20.5 L/yr

Explore more salaries
Compare GEBBS TECHNOLOGIES with

TCS

3.7
Compare

Accenture

3.9
Compare

Cognizant

3.8
Compare

Infosys

3.6
Compare
Did you find this page helpful?
Yes No
write
Share an Interview