A security administrator associates various permission lists with a user ID when setting up user profiles in
the system.
These permission lists are _____ and ______. (Choose two.)
A.
assigned to Audit
B.
assigned with workflow
C.
assigned directly to a user
D.
assigned to the HR Administrator
E.
assigned to the Department Tree
F.
associated with roles that are assigned to a user