i
NTT Data
Filter interviews by
posted on 20 Dec 2022
I applied via LinkedIn and was interviewed in Nov 2022. There were 2 interview rounds.
SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.
SU22 is used to set default values for authorization fields
SU24 is used to maintain authorization checks for transactions and reports
SU25 is used to maintain the upgrade of authorization objects during system upgrades
All three transactions are used in SAP to m
To troubleshoot GRC ARM request submission issue, follow these steps:
Check if the user has the necessary authorization to submit the request
Verify if the request is complete and all mandatory fields are filled
Check if there are any system errors or connectivity issues
Review the GRC logs to identify any errors or warnings
If the issue persists, escalate to the GRC support team for further investigation
MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.
MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.
It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.
BRF+ is an application used to create business rules that ca...
Roles can be imported in GRC using the Role Upload functionality.
Navigate to Access Management > Role Upload
Select the system and upload the role file in CSV format
Map the fields and validate the data
Submit the job for import
Risk analysis for custom tcodes can be done using SAP GRC Access Control.
Create custom roles and assign tcodes to them
Run risk analysis using SAP GRC Access Control
Analyze the results and mitigate any identified risks
Regularly review and update custom roles and tcodes
Consider using SAP GRC Access Control's continuous compliance monitoring feature
Expert mode in PFCG allows advanced customization of authorization roles.
Expert mode provides access to additional tabs and fields for fine-tuning roles.
It allows for more complex authorization logic and the ability to add custom fields.
Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.
Examples of advanced customization include restricting access to specific transac
Centralized EAM system has a single database while Decentralized EAM system has multiple databases.
Centralized EAM system is easier to manage and maintain.
Decentralized EAM system provides more flexibility and autonomy to individual departments.
Preference depends on the organization's size, structure, and requirements.
Top trending discussions
posted on 22 Aug 2021
I applied via LinkedIn and was interviewed in Jul 2021. There was 1 interview round.
To add an object to a custom T code in SAP Security & GRC, you need to follow these steps:
Identify the custom T code where you want to add the object
Access the transaction code SE93 to maintain the T code
Enter the T code and click on the 'Create' button
Provide a short description and select the appropriate program type
In the 'Objects' tab, click on the 'Add Object' button
Enter the object name and description
Save the ch...
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
SAP Security involves protecting SAP systems from unauthorized access and ensuring data integrity.
SAP Security involves setting up user roles and authorizations to control access to sensitive data
It includes implementing security measures such as encryption, authentication, and monitoring
Regular security audits and updates are essential to maintain a secure SAP environment
GRC stands for Governance, Risk, and Compliance. It is used to manage regulations and policies within an organization.
GRC helps organizations align their operations with regulatory requirements and internal policies.
It provides a framework for managing risks and ensuring compliance with laws and regulations.
GRC solutions often include tools for policy management, risk assessment, and compliance monitoring.
Examples of G...
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Mitre frameworks provide a structured approach to categorize and analyze cyber threats, mapping them against known attack techniques.
Mitre frameworks such as ATT&CK provide a comprehensive list of known adversary tactics and techniques.
Security analysts use these frameworks to map observed threats and attacks to specific techniques, aiding in threat intelligence and incident response.
By aligning observed behaviors with...
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
Software Engineer
932
salaries
| ₹2.8 L/yr - ₹11 L/yr |
Senior Associate
767
salaries
| ₹1.1 L/yr - ₹7.5 L/yr |
Network Engineer
647
salaries
| ₹1.8 L/yr - ₹10 L/yr |
Software Developer
615
salaries
| ₹2.5 L/yr - ₹13 L/yr |
Senior Software Engineer
512
salaries
| ₹6.5 L/yr - ₹24 L/yr |
Tata Communications
Bharti Airtel
Reliance Communications
Vodafone Idea