Previous Topic: STEP 2Next Topic: STEP 4


STEP 3

Simulate the access and initiation attempt using the ACID in question.

Was the access or initiation logged?