Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor?

Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor? (Choose two.)

Which two security mechanisms can be directed through a sub-element of the <user-dataconstraint> element in a web application deployment descriptor? (Choose two.)

A.
authorization

B.
data integrity

C.
confidentiality

D.
authentication

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *