New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft PL-900 Exam - Topic 17 Question 61 Discussion

Actual exam question for Microsoft's PL-900 exam
Question #: 61
Topic #: 17
[All PL-900 Questions]

A Power Apps developer has sufficient permissions to create apps, connections, and flows. The developer does not have permissions needed to access company dat

a. You need to grant the developer access to company data for an app. Which predefined security role should you assign to the developer?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Sommer
4 months ago
Surprised there's no role specifically for data access!
upvoted 0 times
...
Linwood
4 months ago
I thought System Customizer had more permissions.
upvoted 0 times
...
Shenika
4 months ago
Wait, can a Basic User even create apps?
upvoted 0 times
...
Karl
4 months ago
Definitely agree with that!
upvoted 0 times
...
Josphine
5 months ago
I think the Environment Maker role is the right choice here.
upvoted 0 times
...
Felicidad
5 months ago
I’m leaning towards the Environment Maker too, but I wonder if there are any specific permissions that might be missing.
upvoted 0 times
...
Helaine
5 months ago
I feel like the System Customizer could be relevant, but I can't recall if it specifically grants data access.
upvoted 0 times
...
Valda
5 months ago
I remember practicing a question about security roles, and I think the Basic User role is too limited for what we need here.
upvoted 0 times
...
Annalee
5 months ago
I think the Environment Maker role might be the right choice since it allows creating apps and accessing data, but I'm not entirely sure.
upvoted 0 times
...
Asuncion
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to cover different architectural patterns, but I'm not sure which one is the best fit for the given scenario. I'll have to think this through carefully.
upvoted 0 times
...
Thad
5 months ago
I remember that private blockchains can require user identities to be known, unlike public ones where everyone can remain anonymous.
upvoted 0 times
...
Gaynell
5 months ago
Telephone, reverse social engineering, and honey pot systems - those are the three I'm going with. Seems like the most logical choices to me.
upvoted 0 times
...

Save Cancel