You need to extend an existing security role.
Which two security elements should you add to the security role? Each answer presents a complete solution.
A. role center
D. process cycle
You are developing an Extensible Data Security (XDS) policy.
Which item must you use?
A. query on the constrained table
B. constrained map
C. query on the primary table
D. duty context