IBM Exam Questions

Which connection type can exploit trusted connections?

Which connection type can exploit trusted connections?

A.
IMS

B.
CAF

C.
CICS

D.
RRSAF

Explanation: