A PSO configured for a __________ takes precedence over a PSO configured for a ___________ to which the user belongs
a. Group, domain
b. Domain, group
c. User, group
d. Distribution group, security group
C. Group-based PSOs are applied according to the precedence value.
Computer Science & Information Technology