Across
- 3. If any Confidential or Internal information is lost or disclosed to unauthorized parties. Incidents must be reported via the ______________ tool.
- 4. We can find the latest SAP logo and word/ppt templates at www.______.com.
- 5. _______ notes must be entered to put the case to status Resolved.
- 7. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
- 10. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portal using the quicklink /go/ _______________ :
- 11. What should be the status of a product security incident if you get a CVSS score of 0.0.:
- 13. Subscribe using the _ to receive email notifications on external updates for cases.
- 14. What determines the priority of a security note?
- 16. Attachments are made visible externally by setting the _ flag.
- 18. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP.
- 19. What should be the final status of a Security Incident:
- 20. Name the Process which contains set of rules and processes for reducing the risks of using third-party software for internal business purposes at SAP.
Down
- 1. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance.
- 2. _______ field ensures that the action plan step documented will be visible to the customer.
- 6. Which Board area does AIS belong to?
- 8. _______ tool targets at providing missing functionality and enhancements to Agent Workspace.
- 9. The _____ feature enables SAP to secure the usage of any application specific function:
- 12. Software with rating ___________ at SAP should not be installed.
- 15. What is the condensed copy of a case with all personal data being anonymized called.
- 17. Patch Day notes are released on 2nd _________ of every Month:
