Using a Permission List associated with a user and identifying security sets and access types in the Security by Permission List component of PeopleSoft are known as _____.

Using a Permission List associated with a user and identifying security sets and access types in the
Security by Permission List component of PeopleSoft are known as _____.

Using a Permission List associated with a user and identifying security sets and access types in the
Security by Permission List component of PeopleSoft are known as _____.

A.
Role-based data permission security

B.
Tree-based data permission security

C.
Group-based data permission security

D.
Country-based data permission security

E.
PeopleCode-based data permission security



Leave a Reply 0

Your email address will not be published. Required fields are marked *