Previous Topic: STEP 3Next Topic: STEP 5


STEP 4

Perform access and initiation attempts using the ACID in question.

Were messages received?