The administrator needs to identify any security role references and security constraints in a web
application.
How can the administrator identify these roles and constraints?
A.
ibm-application-ext.xml file using a text editor.
B.
ibmconfig folder in the application after using the EARExpander command.
C.
Web deployment descriptor using IBM Assembly and Deploy Tools.
D.
Security role to user/group mapping by using the Integrated Solutions Console (ISC).