A. Use profiles, sharing rules, and change OWD to public read-only.
B. Use profiles, manual sharing, and field-level security.
C. Use profiles, permission sets, and field-level security.
D. Use profiles, permission sets, role hierarchy, and field-level security.

Suggest answer: A

Reference:

No comments:

Please share to make the community better.