When impersonating a user, the impersonator can:
-- Access exactly what that impersonated user can access (apps, modules,data)
-- Test what different users can do
So A is the better answer
This section is not available anymore. Please use the main Exam Page.CSA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Parth012
1 year, 4 months agojulianamendo
1 year, 11 months agosegunal
1 year, 11 months agofloelynn
10 months, 1 week ago814a756
1 year, 4 months agoPeterK0
1 year, 6 months agosifot
2 years, 4 months agosaiakhilpalle
2 years, 7 months agoBonche
2 years, 9 months agosom_420
3 years, 4 months ago