Question 6 of 106
Using a Permission List associated with a user and identifying security sets and access types in the Security by Permission List component of PeopleSoft are known as .
    Correct Answer: A

Question 7 of 106
Your organization has decided to implement row-level security. You suggested securing data by associating the company with people having jobs. This method of securing data is known as .
    Correct Answer: C

Question 8 of 106
Adam is entering new hire information in the PeopleSoft system. Adam enters the new hire personal information and creates the organizational relationship of the new hire as EMPLOYEE. After Adam establishes the new hire's relationship with the organization, the system opens the JOB DATA page for Adam to enter the new hires job-related information. Adam decides to complete the new hires job-related information after his lunch break and cancels out of the JOB DATA page.
What must be Adam's approach to successfully complete the new hire's job-related information in the PeopleSoft system after his break?
    Correct Answer: C

Question 9 of 106
What should you do when system performance is affected and you no longer want to maintain all employee records on the Job table?
    Correct Answer: A

Question 10 of 106
Which three fields default from the Department table to the employee job data level? (Choose three.)
    Correct Answer: B, C, F