When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)
Which of the following are system security threats? (Choose three.)
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? (Choose two.)
Where is the application log information (SLG1) saved?
What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)
Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.)