New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

GIAC Secure Software Programmer – Java GSSP-Java Question # 11 Topic 2 Discussion

GIAC Secure Software Programmer – Java GSSP-Java Question # 11 Topic 2 Discussion

GSSP-Java Exam Topic 2 Question 11 Discussion:
Question #: 11
Topic #: 2

Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code for specifying the security roles for a Web application.

Manager

Admin

Member

Which of the following are the valid <auth-constraint> element that will allow the users to access resources constrained by the security role declared given above?

Each correct answer represents a complete solution. Choose all that apply.


A.

<auth-constraint>

*

</auth-constraint>


B.

<auth-constraint/>


C.

<auth-constraint>

Admin

Manager

</auth-constraint>


D.

<auth-constraint>

admin

</auth-constraint>


E.

<auth-constraint>

Admin

</auth-constraint>


F.

<auth-constraint>

Manager

</auth-constraint>


Get Premium GSSP-Java Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.