READ Free Dumps For SAP- C_GRCAC_10
Question ID 20731 | What must you define in order to analyze user access for a critical transaction? |
Option A | A critical mitigation control |
Option B | A critical role |
Option C | A critical profile |
Option D | A critical access rule |
Correct Answer | D |
Question ID 20732 | Which prerequisites must be fulfilled if you want to create a technical role using Business Role Management? (Choose two) |
Option A | The role methodology must be defined. |
Option B | Organizational level mapping must be created. |
Option C | Role attributes such as business process and subprocess must be defined. |
Option D | The workflow approval path and relevant approvers must be defined. |
Option E | Access risk rules must be generated. |
Correct Answer | A,C |