Using a Permission List associated with a user and identifying security sets and access types in the
Security by Permission List component of PeopleSoft are known as _____.
A.
Role-based data permission security
B.
Tree-based data permission security
C.
Group-based data permission security
D.
Country-based data permission security
E.
PeopleCode-based data permission security