Infosys
AM Infoweb Interview Questions and Answers
Q1. There are 5 different user types 1- Dialog user 2- System user 3- Communication user 4-Service user 5- Reference user
Different user types in SAP: Dialog, System, Communication, Service, Reference
Dialog user: used by humans to log in and perform transactions
System user: used by system processes and background jobs
Communication user: used for communication between systems
Service user: used for specific services or applications
Reference user: used as a template for creating new users
Q2. what are critical Authorization objects in security
Critical Authorization objects are essential for controlling access to sensitive data and functions within SAP systems.
S_USER_AUTH - User authorization object for user maintenance
S_PROGRAM - Authorization object for executing programs
S_TABU_DIS - Table maintenance authorization object
S_TCODE - Transaction code authorization object
S_RFC - Remote function call authorization object
Q3. Tell me some User types
Some user types include end users, power users, administrators, and developers.
End users are regular users who utilize the system for their daily tasks.
Power users have advanced permissions and capabilities within the system.
Administrators have full control over the system and its configuration.
Developers create and customize functionalities within the system.
Q4. Tell me some t-codes
T-codes are transaction codes used in SAP to access specific functions or perform specific tasks.
T-code SU01 - User Maintenance
T-code SE38 - ABAP Editor
T-code SM21 - System Log
T-code SE11 - Data Dictionary
T-code SE16 - Data Browser
Q5. What is sap security
SAP security involves protecting the SAP system from unauthorized access and ensuring data integrity.
SAP security involves setting up user roles and authorizations to control access to sensitive data
It includes implementing security measures such as encryption, authentication, and monitoring
Regular security audits and updates are essential to maintain a secure SAP environment
Q6. Define BTP and the scope of work?
BTP stands for Business Technology Platform. It is a platform-as-a-service offering from SAP that provides tools and services for developing, integrating, and extending applications.
BTP offers services such as database and data management, analytics, machine learning, and IoT.
It allows businesses to build, run, and manage applications in the cloud.
Scope of work includes implementing security measures, configuring access controls, monitoring user activities, and ensuring compl...read more
Q7. Waste of the panalists
The question seems to be asking about the panelists' opinions on something being wasteful.
Discuss the importance of efficient resource allocation in SAP security projects
Provide examples of common wasteful practices in SAP security, such as over-provisioning of user access rights
Explain how proper planning and risk assessment can help prevent wastage of time and resources
Q8. Waste of panelists
The question is likely asking about the inefficiency or redundancy of having multiple panelists in a discussion or decision-making process.
Having too many panelists can lead to inefficiency and lack of focus in discussions.
Some panelists may not contribute meaningfully or may repeat points already made by others.
Reducing the number of panelists can lead to more productive and streamlined discussions.
It's important to have a balanced mix of expertise and perspectives among pan...read more
Interview Process at AM Infoweb
Reviews
Interviews
Salaries
Users/Month