Which of the following checks are performed for SAProuter by the SAP Security Optimization Service? (Choose three.)
Which of the following are phases in the SAP Audit Management auditing process? (Choose three.)
Which of the following parameters must be configured to capture log data in the Security Audit Log?
Which transaction code allows you to configure the SAP Security Audit Log?
Which of the following actions are required to ensure complete logging of table data changes? (Choose three.)