How can the administrator identify these roles and constraints?

The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
A. ibm-application-ext.xml file using a text editor.
B. ibmconfig folder in the application after using the EARExpander command.
C. Web deployment descriptor using IBM Assembly and Deploy Tools.
D. Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.