Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code for specifying the security roles for a Web application.
Which of the following are the valid <auth-constraint> element that will allow the users to access resources constrained by the security role declared given above?
Each correct answer represents a complete solution. Choose all that apply.
Submit