Data Security Policies restrict the actions or operations that can be performed on a specific
business object (for example, Inventory Items). Which three Data Security Policies can restrict
access? (Choose three.)
A.
All Instances
B.
An instance Set
C.
A Data Group Set
D.
A specific Instance
E.
A specific Data Group