Which of the following statements about Microsoft Dynamics AX 2012 data security policies are
true? (Choose all that apply.)
A.
Data security policies cannot be used to restrict access to an individual database.
B.
Data security policies can be applied to security roles to control access to transactional data.
C.
Data security policies can be used to control access to transactional data based on a query.
D.
Data security policies can be used to control access to transactional data based on user data.
E.
Data security policies can be used to control access to transactional data based on an effective
date.