Questions for the C-SEC-2405 were updated on : Dec 01 ,2025
Page 1 out of 6. Viewing questions 1-15 out of 80
Question 1
For which of the following can transformation variables be used?
A. To save data to the output JSON file
B. To save data temporarily
C. To save data permanently
Answer:
B
User Votes:
A
50%
B
50%
C
50%
Discussions
0/ 1000
Question 2
Which cryptographic libraries are provided by SAP? Note: There are 2 correct answers to this question.
A. CommonCryptoLib
B. SecLib
C. Cryptlib
D. SAPCRYPTOLIB
Answer:
A, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which of the following is part of the SAP S/4HANA central Ul component?
A. SAP Fiori object page
B. SAP Fiori transactional application
C. SAP Fiori launchpad
D. SAP Fiori analytical application
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3 correct answers to this question.
A. One user administrator per application area in the production system
B. One user administrator per production system
C. One authorization profile administrator
D. One authorization data administrator
E. One decentralized role administrator
Answer:
B, D, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 5
SAP BTP distinguishes between which of the following users? Note: There are 2 correct answers to this question.
A. Key users
B. Technical users
C. Business users
D. Platform users
Answer:
C, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?
A. Field values have not been changed.
B. The field delivered with content was changed but the old value was retained.
C. Field values were changed as a result of the merge process.
D. Field values were unchanged and no new authorization was added.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which solution analyzes an SAP system's administrative areas to safeguard against potential threats?
A. SAP Code Vulnerability Analyzer
B. SAP Security Optimization Services
C. SAP EarlyWatch Alert
D. SAP Enterprise Threat Detection
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3 correct answers to this question.
A. By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.
B. By supporting content activation at the business role level, including SAP Fiori apps and all associated Web Dynpro for ABAP applications.
C. By helping customers to start exploring SAP Fiori in SAP S/4HANAon premises as quickly as possible.
D. By allowing customers to select and activate SAP Fiori apps one by one, independent of dependencies needed for app-to-app navigation.
E. By allowing customers to select individual SAP Fiori apps for their end-to-end business processes.
Answer:
A, B, C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
What happens to data within SAP Enterprise Threat Detection during the aggregation process? Note: There are 3 correct answers to this question.
A. It is prioritized.
B. It is categorized.
C. It is pseudonymized.
D. It is normalized.
E. It is enriched.
Answer:
C, D, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
Which of the following can you use to check if there is an application start lock on an application contained in a PFCG role? Note: There are 2 correct answers to this question.
A. Transaction SUIM - Executable Transactions report
B. Transaction SM01_CUS
C. Transaction SUIM - Transactions Executable with Profile report
D. Transaction SM01 DEV
Answer:
A, C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following services does the Identity Authentication Service provide? Note: There are 2 correct answers to this question.
A. Policy refinement
B. Authentication
C. Single Sign-On
D. Central User Repository
Answer:
B, C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
After you maintained authorization object S_TABU_DIS and ACTVT field value 02 as authorization defaults for transaction SM30 in your development system, what would be the correct option for transporting only these changes to your quality assurance system?
A. Save your changes and use the transport interface in SU25 to transport the changes using the Transport Management System.
B. Save your changes to a Workbench transport request and transport using the Transport Management System.
C. Save your changes to a Customizing transport request and transport using the Transport Management System.
D. Save tables USOBT_C and USOBX_C to a transport request and transport using the Transport Management System.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
Which of the following allow you to control the assignment of table authorization groups? Note: There are 2 correct answers to this question.
A. V_DDAT_54
B. PRGN_CUST
C. SSM_CUST
D. V_BRG_54
Answer:
A, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
Which SAP Fiori deployment option requires the Cloud connector?
A. SAP S/4HANA Cloud Public Edition
B. SAP Fiori for SAP S/4HANA standalone front-end server
C. SAP S/4HANA embedded
D. SAP Business Technology Platform
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
Which protocol is the industry standard for provisioning identity and access management in hybrid landscapes?