Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor? (Choose two.)
A.
authorization
B.
data integrity
C.
confidentiality
D.
authentication
Explanation:
Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor? (Choose two.)
Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor? (Choose two.)
A.
authorization
B.
data integrity
C.
confidentiality
D.
authentication
Explanation:
B y C