Which PeopleSoft table do you use to identify a group of employees who share common pay characteristics?
Using a Permission List associated with a user and identifying security sets and access types in the Security by Permission List component of PeopleSoft are known as _____.