Which restriction rules can you use to control the access to an installed base? Note: There are 2correct answers to this question.
Business role
Territories
Measurement and reading
Employee
Submit