A. Data access prevention requirements, then identify frequency
B. Inbound integration requirements, then identify frequency
C. Data access prevention requirements, integration requirements, and system constraints

Suggest answer: B

Reference:

No comments:

Please share to make the community better.