Compliance Champions League 2023 - Crossword
Across
- 3. Attachments are made visible externally by setting the _ flag:
- 6. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
- 10. Patch Day notes are released on 2nd _________ of every Month :
- 11. Subscribe using the _ to receive email notifications on external updates for cases :
- 12. Software with rating ___________ at SAP should not be installed:
- 13. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
- 15. _______ notes must be entered to put the case to status Resolved:
- 16. The _____ feature enables SAP to secure the usage of any application specific function:
- 18. _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
- 20. _______ field ensures that the action plan step documented will be visible to the customer:
Down
- 1. We can find the latest SAP logo and word/ppt templates at www.______.com :
- 2. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
- 4. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
- 5. Which Board area does AIS belong to?
- 7. To installl a software which is not listed in software center, we get it via go/ :
- 8. What should be the status of a product security incident if you get a CVSS score of 0.0.:
- 9. While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
- 14. What should be the final status of a Security Incident:
- 17. How is the priority of the security note calculated?
- 19. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com: