Okay, I've got this. The key is to identify the option that does not describe a disadvantage of decentralization. I'll use my knowledge of organizational structures to guide my answer.
This seems like a pretty straightforward requirement to me. I'd probably use an Apex Trigger to listen for the create/update events on the PIM system and then create/update the corresponding records in Salesforce.
I feel pretty good about this question. The key things a security policy needs to cover are what's being secured, who needs to follow it, and the potential vulnerabilities or threats. I'll mark those options and move on.
B has to be the correct answer, but I'm stumped on the second one. Maybe they're trying to trick us with those other options? I bet the person who wrote this question is a real character.
Jesusita
4 months agoHailey
5 months agoJolanda
5 months agoJettie
5 months agoCassi
5 months agoEden
6 months agoSalome
6 months agoGladys
6 months agoBeckie
6 months agoLemuel
6 months agoCammy
6 months agoGennie
6 months agoAlbina
6 months agoWilda
6 months agoWhitley
6 months agoCasie
6 months agoLilli
6 months agoSalley
6 months agoHershel
11 months agoShalon
11 months agoBrunilda
10 months agoLeigha
10 months agoLayla
11 months agoAdell
10 months agoLawrence
11 months agoRosina
11 months agoCarissa
12 months agoMakeda
12 months agoEun
11 months agoLenna
11 months agoDarrel
1 year agoCeola
10 months agoFausto
10 months agoDana
11 months agoSena
11 months agoErnie
11 months agoParis
11 months agoHan
11 months agoDulce
11 months agoLavonda
1 year agoAhmed
1 year ago