Given the two security constraints in a deployment descriptor:
101. <security-constraint>
102. <!–a correct url-pattern and http-method goes here–>
103. <auth-constraint><role-name>SALES</role-name></auth-
103. <auth-constraint>
104. <role-name>SALES</role-name>
105. </auth-constraint>
106. </security-constraint>
107. <security-constraint>
108. <!–a correct url-pattern and http-method goes here–>
109. <!– Insert an auth-constraint here –>
110. </security-constraint>
If the two security constraints have the same url-pattern and http-method, which two, inserted
independently at line 109, will allow users with role names of either SALES or MARKETING to
access this resource? (Choose two.)
A.
<auth-constraint/>
B.
<auth-constraint>
<role-name>*</role-name>
</auth-constraint>
C.
<auth-constraint>
<role-name>ANY</role-name>
</auth-constraint>
D.
<auth-constraint>
<role-name>MARKETING</role-name>
</auth-constraint>
Explanation: