New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft PL-600 Exam - Topic 8 Question 27 Discussion

Actual exam question for Microsoft's PL-600 exam
Question #: 27
Topic #: 8
[All PL-600 Questions]

You are designing a model-driven app that allows a company to manage sales opportunities.

The company has a complex security model that includes the following requirements:

The vice president of sales must be able to see opportunities for sales managers and sales representatives.

Sales managers must be able to see opportunities for all sales representatives.

Sales representatives must only see opportunities that they own.

You need to recommend security tools for controlling user access.

Which two tools should you recommend? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer: C, D

With the position hierarchy security, a user at a higher position has access to the records owned by a lower position user or by the team that a user is a member of, and to the records that are directly shared to the user or the team that a user is a member of.

The hierarchy security model is an extension to the earlier security models that use business units, security roles, sharing, and teams. It can be used in conjunction with all other existing security models.


https://docs.microsoft.com/en-us/dynamics365/customerengagement/on-premises/developer/security-dev/

hierarchical-security-control-access-entities

Contribute your Thoughts:

0/2000 characters
Genevive
4 months ago
Not sure if Account hierarchy fits the bill here.
upvoted 0 times
...
Kris
4 months ago
Yeah, Security roles are a must for managing access.
upvoted 0 times
...
Herminia
4 months ago
Wait, can Field security profile really handle this?
upvoted 0 times
...
Mabel
4 months ago
I think Position hierarchy could work too.
upvoted 0 times
...
Marsha
5 months ago
Definitely going with Security roles for this!
upvoted 0 times
...
Louvenia
5 months ago
I feel like field security profiles are more about data access rather than user visibility, so I’m leaning towards security roles and position hierarchy.
upvoted 0 times
...
Arlene
5 months ago
I practiced a similar question where security roles were definitely part of the solution, but I’m unsure about the account hierarchy.
upvoted 0 times
...
Roselle
5 months ago
I’m not entirely sure, but I think the position hierarchy might help with the visibility for the vice president and sales managers.
upvoted 0 times
...
Meghan
5 months ago
I remember we discussed security roles in class, and they seem crucial for managing access based on user roles.
upvoted 0 times
...
Marleen
5 months ago
Disaster Recovery is probably the best option here, since that's specifically for restoring data in case of an emergency.
upvoted 0 times
...
Jenifer
5 months ago
Hmm, I'm a bit unsure about the different routing options here. I'll need to carefully review the details of each answer choice to understand the differences between the geolocation routing and the alias record approaches.
upvoted 0 times
...
Deja
5 months ago
Okay, let's see here. The question is asking about automatically protecting Lambda functions, so I'm guessing the correct answer has to do with some kind of automated security configuration. I'm leaning towards option C, but I'll double-check the other options just to be sure.
upvoted 0 times
...

Save Cancel