Your organization has decided to implement row-level security. You suggested securing data by
associating the company with people having jobs. This method of securing data is known as _____.
A.
Access Type / Role
B.
Permission List / Role
C.
Security set / Access Type
D.
Security set / Permission List
E.
Permission List / User Profile
F.
Access Type / Permission List