A user’s effective security is the _______ of all roles granted to that user.
What would need to be applied in order to prevent a user from viewing an email address on the contact entity of a model-driven app they have access to?
Field level security
Business unit access
Organization level access
What access level gives the greatest scope?
You must answer all questions before checking your work.
Need help? See our troubleshooting guide or provide specific feedback by reporting an issue.