Which of the following defines "Phishing"?
SAP Cloud Identity and Access Governance consists of which of the following software services? (Choose three.)
What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.)
You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?
Which of the following are core principles of GDPR? (Choose three.)
Which of the following are examples of personal data under the GDPR? (Choose three.)