_____________________ are just role containers, they do not have any authorizations of their own

Composite Roles
Master Roles
Customizing Roles
Derived Roles
Verified Answer
Correct Option - a

To get all Infosys Certified L2 Junior Security Professional Consultant Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram