You are an enterprise application developer. You create a Web-based application and deploy it to your customers. The application requires the users to log on to use the application. The application does not permit impersonation. The application also requires the users to connect to the database and to a folder in the Web server. Your customers report a security bug. The bug denies access to the logged-on users every time they try to upload a file to the folder in the Web server.
Your customers provide you with the following data to reproduce the bug:
The version of the Web-based application
The users steps in the Web-based application
The version of the operating system
You find that the information is insufficient to reproduce the bug. You need to identify the additional information that is required to reproduce the bug. Which two additional data should you use? (Each correct answer presents part of the solution. Choose two.)
A.
Security settings for the folder on the Web server
B.
Security settings for the logged-on user
C.
Security settings for the ASP.NET process account
D.
The file for upload
E.
Security settings for the file for upload