{"id":2700,"date":"2018-02-01T06:00:39","date_gmt":"2018-02-01T05:00:39","guid":{"rendered":"https:\/\/www.xiting.us\/?p=2700"},"modified":"2026-02-15T16:42:30","modified_gmt":"2026-02-15T15:42:30","slug":"sap-security-challenge-february-2018","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/","title":{"rendered":"SAP Security Challenge &#8211; February 2018"},"content":{"rendered":"<p>Welcome to the&nbsp;<a href=\"https:\/\/www.xiting.us\/blog\/sap-security-challenge\/\">SAP Security Challenge<\/a>&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset.<\/p>\n<p>We will publish a new&nbsp;<span class=\"highlight\"><span class=\"colour\"><span class=\"font\"><span class=\"size\">quiz<\/span><\/span><\/span><\/span>&nbsp;every first of the month, consisting of ten (10) questions. Participants can submit their answers anytime between the first and last day of the month. The winner will be announced on the first day of the following month via newsletter and on our blog. Each participant enters the draw to win a ticket. One correct answer&nbsp;gives you one ticket in the draw (e.g. 8 correct answers gives you 8 tickets). The more you know, the higher the chances to win.<\/p>\n<h2>January&#8217;s Challenge<\/h2>\n<p>In January&#8217;s challenge, we had 112 participants and an overall average of 7.1 correct answers. In total, 9 participants&nbsp;were able to answer all questions correctly.<\/p>\n<h3>January&#8217;s Champion<\/h3>\n<p>We are very happy to announce that <strong>Connie T.<\/strong>&nbsp;is the lucky winner of the SAP Security challenge&nbsp;of January 2018. Connie answered 9 questions correctly and wins a free ticket to the HANA, BI, Basis and Admin conference in Las Vegas. Congratulations, Connie.<\/p>\n<h3>Answers from January&#8217;s Challenge<\/h3>\n<p><strong>Which SAP standard transaction can be used to mass maintain users?<\/strong><br \/>\nTransaction SU10 allows mass maintenance of users.<\/p>\n<p><strong>Which of the following tables can help in determining the single roles which are assigned to a given composite role?<\/strong><br \/>\nTable AGR_AGRS holds the relationship between composite and its singles roles.<\/p>\n<p><strong>Which transaction can be used to check the User Buffer?<\/strong><br \/>\nTransaction SU56 allows an administrator to not only view his own authorizations that are loaded into the buffer but also for other users.<\/p>\n<p><strong>An SAP system knows five different types of users, which of them can be used for Dialog Logon?&nbsp;<\/strong><br \/>\nDialog and Service users can be used for Dialog Logon.<\/p>\n<p><strong>In client 066 (EarlyWatch), what is the default password of user EARLYWATCH after installation?<\/strong><br \/>\nThe default password of EARLYWATCH in client 066 is SUPPORT. Make sure to change the password to protect your SAP system.<\/p>\n<p><strong>Which standard report can be used to check SAP default passwords of standard users?<\/strong><br \/>\nThe standard report RSUSR0003 displays standard users and its status across all clients in a system. It is important to execute this report in each system, as users are client dependent and hence different in each client and system.<\/p>\n<p><strong>What is the Code Version in SAP used for?<\/strong><br \/>\nPasswords are stored as a hash value and not in cleartext. An algorithm generates the hash value from the cleartext password and stores its value in the USR02 table. The algorithm that generates that hash value is called code version.<\/p>\n<p><strong>Which standard transaction allows the maintenance of authorizations values (including organizational levels) of multiple roles?<\/strong><br \/>\nTransaction PFCGMASSVAL allows the maintenance of authorizations values of multiple roles including the maintenance of organization levels and its field values.<\/p>\n<p><strong>What&#8217;s correct about client-dependent and client-independent tables?<\/strong><br \/>\nClient-dependent tables contain data that a user creates in one client and that is not shared among other clients. An example of a client-dependent table is the user master data table USR02. Client-independent tables, on the other hand, contain data that is shared across all clients of a system (e.g. dictionary objects in table TADIR). To distinguish if a table is client-dependent or client-independent, field MANDT of type CLNT exists in client-dependent tables only.<\/p>\n<p><strong>Client-independent tables are protected with which authorization object?<\/strong><br \/>\nClient-independent tables must be protected properly as maintenance can cause side-effects in other clients. Therefore, SAP implemented a supplementary authorization object (S_TABU_CLI) which is only checked when trying to maintain client-independent tables in addition to S_TABU_DIS and S_TABU_NAM.<\/p>\n<h2>February Challenge<\/h2>\n<p>[qsm quiz=4]<\/p>\n<p>We wish you the best of luck in February&#8217;s challenge.<\/p>\n<div class=\"grammarly-disable-indicator\"><\/div>\n<div class=\"grammarly-disable-indicator\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset. We will publish [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[145],"class_list":["post-2700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-securityquiz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Challenge &#8211; February 2018 - Xiting<\/title>\n<meta name=\"description\" content=\"Try the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Challenge &#8211; February 2018\" \/>\n<meta property=\"og:description\" content=\"Try and beat me in the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-01T05:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-15T15:42:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"964\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#039;t know? To help you identify\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"SAP Security Challenge &#8211; February 2018\",\"datePublished\":\"2018-02-01T05:00:39+00:00\",\"dateModified\":\"2026-02-15T15:42:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/\"},\"wordCount\":662,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"keywords\":[\"securityquiz\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/\",\"name\":\"SAP Security Challenge &#8211; February 2018 - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"datePublished\":\"2018-02-01T05:00:39+00:00\",\"dateModified\":\"2026-02-15T15:42:30+00:00\",\"description\":\"Try the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"width\":964,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-february-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Challenge &#8211; February 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Challenge &#8211; February 2018 - Xiting","description":"Try the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Security Challenge &#8211; February 2018","og_description":"Try and beat me in the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.","og_url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2018-02-01T05:00:39+00:00","article_modified_time":"2026-02-15T15:42:30+00:00","og_image":[{"width":964,"height":600,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_description":"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don't know? To help you identify","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"SAP Security Challenge &#8211; February 2018","datePublished":"2018-02-01T05:00:39+00:00","dateModified":"2026-02-15T15:42:30+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/"},"wordCount":662,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","keywords":["securityquiz"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/","url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/","name":"SAP Security Challenge &#8211; February 2018 - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","datePublished":"2018-02-01T05:00:39+00:00","dateModified":"2026-02-15T15:42:30+00:00","description":"Try the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","width":964,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-february-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Challenge &#8211; February 2018"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=2700"}],"version-history":[{"count":2,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2700\/revisions"}],"predecessor-version":[{"id":46928,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2700\/revisions\/46928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/9385"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=2700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=2700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=2700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}