Archive for the ‘SAP’ Category


C_TADM70_73 SAP Certified Technology Associate – OS DB Migration for SAP NetWeaver 7.30

by admin ·

Product Group: Platform
Solution: SAP NetWeaver
Sub-solution: Administration
Component: Strategic Enterprise Management
Delivery Methods: Certification
Level: Associate

Exam: 40 questions
Sample Questions: PDF Link
Cut Score: 59%
Duration: 60 mins
Languages: English

This certification path will validate your capability as a well-trained technologist and prepare you to help your client or employer manage and execute key business processes. Armed with an understanding of SAP NetWeaver 7.30 and OS/DB migration for SAP systems, you can implement this knowledge for your projects as a technology consultant

Topic Areas
Please see below the list of topics that may be covered within this certification and the courses that cover them. Its accuracy does not constitute a legitimate claim; SAP reserves the right to update the exam content (topics, items, weighting) at any time.
Advanced Migration Techniques > 12%

Identify the Time critical steps in an R3LOAD / JLOAD based system copy. Describe the Methods/strategies to save time during system copy.

ADM545 (NW AS 7.40)
R3LOAD and JLOAD Files > 12%

Explain the purpose, contents, and structure of the R3LOAD and JLOAD control and data files.

SAP Migration Tools > 12%

Recognize the tools that are required to perform a SAP OS/DB migration and describe their functions.

Introduction 8% – 12%

Clarify what is a homogeneous or heterogeneous system copy, which tools are available, what is the Going Live OS/DB Migration Check Service, and from where to get information about the migration procedure.

Migration and Special Projects 8% – 12%

Describe the scope of services performed by the SAP OS/DB Migration Check. Estimate the effort involved in a migration. Plan a migration project.

Performing the Migration 8% – 12%

Describe the migration procedure and explain the steps required to migrate an ABAP and Java based system.

System Copy Methods 8% – 12%

Evaluate the database-specific and unspecific options for performing SAP homogeneous or heterogeneous system copies (OS/DB Migrations).

Technical Background and Troubleshooting 8% – 12%

Describe how Data Classes are used to map tables to database storage units and how Data Classes are handled by R3LDCTL and R3LOAD. Explain the purpose of table DBDIFF, and describe how the R3LOAD/JLOAD data access works. Distinguish between the R3SZCHK behavior if the target database type is the same or different than the source database type.


Exam Preparation

Each specific certification comes with its own set of preparation tactics. We define them as “Topic Areas” and they can be found on each exam description. You can find the number of questions, the duration of the exam, what areas you will be tested on, and recommended course work and content you can reference.

Please be aware that the professional- level certification also requires several years of practical on-the-job experience and addresses real-life scenarios.

The command file DBEXPORT.R3S controls the database export of a

A. Heterogeneous system copy.
B. For both systems
C. Homogeneous system copy

Answer: B

A customer plans to invest in a new and more powerful hardware for his ABAP-based SAP production
system (no JAVA web As installed). As the operating system and database version are not up-to-date, he
also wants to change to the latest software version in a single step while doing the system move.
Current system configuration: Oracle 10.2, AIX 6.1
Planned system configuration: Oracle 11.2, AIX 7.1
Is the planned system move a ..
Which statement is false?

A. An OS migration
B. A DB migration
C. Homogeneous system copy
D. Hetergeneous system copy

Answer: D

To prevents unintended overlaps between filed names in tables and R3LOAD key words, as well as other
inconsistencies. What do you perform?

A. Before the data export/Import, R3LOAD performs a syntax check on the *STR files.
B. After the data export/import, R3LOAD performs a syntax check on the *STR files

Answer: A

Every database vendor provides a JDBC interface for easy database access. Interface? which JDBC
interface is used for SAP?

A. JDBC interface provide by the database vendor
B. SAP using it own JDBC interface

Answer: B

The “SAP OS/DNI Migration Check Analysis session” Will be performed on

A. The production migration source system
B. The migrated production system after the final migration

Answer: A

Click here to view complete Q&A of C_TADM70_73 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best SAP Certified Technology Associate C_TADM70_73 Certification, SAP C_TADM70_73 Training at


Weak passwords still the downfall of enterprise security

by admin ·

A pet’s name or a favorite movie just isn’t enough

Computerworld – A recent data breach that exposed the Social Security numbers of more than 255,000 people in Utah has once again highlighted the longstanding but often underestimated risks posed to organizations by weak and default passwords.

The breach, involving a Medicaid server at the Utah Department of Health, resulted from a configuration error at the authentication layer of the server hosting the compromised data, according to state IT officials.

Many security analysts see that as a somewhat euphemistic admission by the state that the breached server was using a default administrative password or an easily guessable one. By taking advantage of the error, the attackers were able to bypass the perimeter-, network- and application-level security controls that IT administrators had put in place to protect the data on the server.

Such mistakes, though relatively easy to avoid, are surprisingly common.
What I think we are seeing is really what I like to call ‘the curse of the reusable password.’
Gartner analyst John Pescatore

In March, the inspector general of the U.S. Department of Energy released the results of an information security audit at the Bonneville Power Administration, which provides about 30% of wholesale power to regional utilities in the Pacific Northwest. According to the audit, vulnerability scans of nine applications used to support key financial, HR and security management functions at Bonneville identified 11 servers that had been configured with easily guessable passwords.

An attacker taking advantage of those vulnerabilities would have been able to gain complete access to the system. Four servers were configured to allow any remote user to access and modify shared files. One server hosted an administrator account that was protected only with a default password.

Earlier this month, a data breach at payment processing company Global Payments that exposed credit- and debit-card data belonging to about 1.5 million people was believed by analyst firm Gartner to have resulted from a weak authentication mechanism that allowed attackers to gain access to an administrative account. An attack on the U.S. Chamber of Commerce by Chinese hackers and a compromise of the open-source WineHQ database last year are also believed to have originated with compromised administrator accounts.

An enterprise can have anywhere from hundreds to thousands of account names and passwords. Many of these accounts often have privileged access to applications, databases, networks and operating systems. While not all of them are always critical to the enterprise, there are numerous accounts that, if abused, can cause serious disruptions enterprisewide.

Previous studies have shown that the number of people who require administrative access to a system for maintenance purposes, or for completing tasks such as patching and upgrading, is often far greater than the number that managers know about or track. Nevertheless, many companies allow users and administrators to apply easy passwords or even default passwords to protect access to such accounts.

When multifactor authentication is used, the measures often involve relatively easy-to-crack knowledge-based authentication (KBA) mechanisms where a user is prompted for an answer to a security question, such as a first pet’s name or the name of a favorite movie.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at
A report released by Verizon last month showed that attacks exploiting weak passwords are still endemic in the retail and hospitality industries. Attackers can still go to a vendor’s site, get a client list and “just hit those [clients] with the default or guessable username-password combination,” Verizon noted in its report. “These are relatively easy attacks that require little in-depth knowledge or creativity.”

The tendency by many people to use the same password for multiple accounts is another huge issue, said John Pescatore, a Gartner analyst.

“A lot of Anonymous’ recent success has been in attacks where they have obtained users’ passwords to external services and then found the same passwords in use at sensitive internal applications or in email systems,” Pescatore said. “What I think we are seeing is really what I like to call ‘the curse of the reusable password.’ ”

One of the most important measures companies can take to ramp up their security is to raise the bar for passwords and authentication mechanisms, he said. “Similar to how you can’t shift from ‘Park’ to ‘Drive’ without putting your foot on the brake, there ought to be ‘safety interlocks’ in any piece of software that make it very hard to shift into Drive without changing the default password,” he said.

Adam Bosnian, executive vice president of corporate development at Cyber-Ark, a vendor of software for managing administrative passwords, said the problem that companies face is complex. While it’s one thing to require that administrators use complex passwords, it’s another thing to manage those passwords, he said. What often happens is that multiple administrators might need access to one system, and it is easiest to use a default or easily remembered password to control access to it.

When a complex password is used, administrators need to have three processes: One for securely sharing that password with each other, another process for changing the password when needed, and a third for keeping everyone informed about the changes. These processes can get especially difficult in larger organizations where the number of privileged accounts can be staggering, he said.

“The truth is, anyone trying to protect non-trivial assets should be using multifactor authentication and/or complementary controls to protect themselves,” said Peter Lindstrom, an analyst with Spire Security. “The password has too many weaknesses, including the obvious human ones,” he said.

Most password schemes that aren’t protected by another form of authentication or lockout controls are susceptible to brute-force compromise, where automated tools are used to guess passwords, he said. “At this stage of the IT game, there is really no excuse for using default passwords.”

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at


SAP updates Business One application for small companies

by admin ·

Business One 8.82 includes an expanded CRM app, simplified order fulfillment, and improved forecasting functions
SAP on Thursday announced a version of Business One, its ERP (enterprise resource planning) suite for small companies as it revs up the marketing strategy behind its Business ByDesign on-demand suite.


Best Microsoft MCTS Training – Microsoft MCITP Training at


Business One 8.82 features a range of improvements, including an expanded CRM (customer relationship management) application that allows companies to develop and manage multichannel marketing programs.

[ Discover what’s new in business applications with InfoWorld’s Technology: Applications newsletter. | Get the latest insight on the tech news that matters from InfoWorld’s Tech Watch blog. ]

Other features target inventory and distribution, such as a simplified “pick and pack” process for order fulfillment that allows users to apply serial codes and batch numbers to specific items; improved long-term business planning functionality; and an “express” configuration wizard.

SAP has also added a number of capabilities to the systems MRP (material requirements planning) module, including a better wizard and improved forecasting functions.

Business One is targeted at companies with 10 to 100 employees, while Business-All-in-One, which is essentially a packaged subset of SAP’s Business Suite enterprise product, is aimed at companies with 1,000 to 2,500 workers. Both are available in hosted or on-premises form.

But the emergence of Business ByDesign has prompted some questions about the market segmentation of the three products, as well as how SAP would sell ByDesign without cannibalizing Business One and All-in-One sales.

SAP this week said it is on track to land 1,000 ByDesign customers by the end of the year, and has about 650 so far. The average deployment per customer has been about 20 subscription seats, co-CEO Bill McDermott said in an interview this week. But SAP is about to aggressively push ByDesign to its large customers as something to use in new subsidiaries or offices. That will result in deals for “thousands of seats at a time,” McDermott predicted.

One thing seems clear: SAP has no intentions of phasing out Business One, having published a development road map that looks out as far as 2014.

But there are still some questions to raise going forward, said Forrester Research analyst China Martens via e-mail.

“I wonder how small to mid-size ERP prospects now look at what SAP offers. Do some of them who previously would have adopted Business One now also look or only look at ByDesign?” she said.

“It’s interesting to note one of the focus areas in the latest version of Business One is on the MRP side,” she added. “I wonder whether user choice between Business One and ByDesign will eventually be more about where each product offers specific built-in vertical support. For now, ByDesign’s focus in that area is professional services, with wholesale next up in [version] 4.0.”

However, overall “it seems like SAP has made its peace with having something of an overlapping product portfolio in the SMB space and now puts less focus on drawing user limit boundaries around Business One, ByDesign, and Business All-in-One,” Martens said.