Okay, I've got this. The key is to identify the option that does not describe a disadvantage of decentralization. I'll use my knowledge of organizational structures to guide my answer.
This seems like a pretty straightforward requirement to me. I'd probably use an Apex Trigger to listen for the create/update events on the PIM system and then create/update the corresponding records in Salesforce.
I feel pretty good about this question. The key things a security policy needs to cover are what's being secured, who needs to follow it, and the potential vulnerabilities or threats. I'll mark those options and move on.
B has to be the correct answer, but I'm stumped on the second one. Maybe they're trying to trick us with those other options? I bet the person who wrote this question is a real character.
Jesusita
3 months agoHailey
3 months agoJolanda
3 months agoJettie
4 months agoCassi
4 months agoEden
4 months agoSalome
4 months agoGladys
4 months agoBeckie
5 months agoLemuel
5 months agoCammy
5 months agoGennie
5 months agoAlbina
5 months agoWilda
5 months agoWhitley
5 months agoCasie
5 months agoLilli
5 months agoSalley
5 months agoHershel
9 months agoShalon
10 months agoBrunilda
8 months agoLeigha
8 months agoLayla
10 months agoAdell
9 months agoLawrence
9 months agoRosina
9 months agoCarissa
10 months agoMakeda
10 months agoEun
10 months agoLenna
10 months agoDarrel
11 months agoCeola
9 months agoFausto
9 months agoDana
9 months agoSena
9 months agoErnie
10 months agoParis
10 months agoHan
10 months agoDulce
10 months agoLavonda
11 months agoAhmed
11 months ago