SAP Security Challenge - January 2019 UK

Complete our January Challenge and enter the draw to win a copy of the SAP System Security Guide. By completing the SAP Security Challenge, you agree to Xiting's Cookie and Privacy Policy.

Your name:
Your email:
How do you create an authorization object?
From which table(s) do you extract user email addresses?
Which of the following are org fields in an SAP ECC system? (select all that apply)
What is the authorization object which gives developer debugging authorization?
In which transaction can you check lock entries?
When programming an AUTHORITY-CHECK statement where you don’t yet know the value which is going to be checked for a field; which of the following are correct approaches? (select all that apply)
You need to create a program which only one user should be able to use. How do you ideally authorize it?