Delegated Development is intended to let administrators grant controlled development permissions to non-admin developers for a specific scoped application. Within that model, admins can allow delegated developers to work on application artifacts and administration tasks that are still limited to the application scope. One of the permitted areas is managing security artifacts, which includes creating and maintaining Access Controls (ACLs) and related security configuration for the application’s tables and resources. That aligns directly to option C. Administrators can also grant the permission to delete the scoped application, which aligns to option D and is treated as a high-impact capability that is explicitly controlled by delegated development permissions. By contrast, option A is not valid because delegated development is for scoped applications and does not grant authority to develop or deploy global applications. Option B is not a delegated development permission category; coalesce configuration is part of import/set-up behavior and is not represented as a delegated developer permission in the application development permission set.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit