which two scenarios would you use Role-based data permission security method as compared to Tree based?

In which two scenarios would you use Role-based data permission security method as compared to Tree
based? (Choose two.)

In which two scenarios would you use Role-based data permission security method as compared to Tree
based? (Choose two.)

A.
Your organization is not hierarchical.

B.
Your organization structure is hierarchical.

C.
Users have access to data for people in specific areas of the organization.

D.
You want a flexible way to grant security access to a person outside a department.

E.
Your security structure is based largely on the organizational department structure.



Leave a Reply 0

Your email address will not be published. Required fields are marked *