When impersonating a user, the impersonator can:
-- Access exactly what that impersonated user can access (apps, modules,data)
-- Test what different users can do
So A is the better answer
This section is not available anymore. Please use the main Exam Page.CSA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Parth012
1 year, 1 month agojulianamendo
1 year, 8 months agosegunal
1 year, 8 months agofloelynn
6 months, 3 weeks ago814a756
1 year agoPeterK0
1 year, 3 months agosifot
2 years, 1 month agosaiakhilpalle
2 years, 4 months agoBonche
2 years, 6 months agosom_420
3 years ago