The administrator needs to identify any security role references and security constraints in a web
application.
How can the administrator identify these roles and constraints?

A.
ibm-application-ext.xml file using a text editor.
B.
ibmconfig folder in the application after using the EARExpander command.
C.
Web deployment descriptor using IBM Assembly and Deploy Tools.
D.
Security role to user/group mapping by using the Integrated Solutions Console (ISC).
The correct is C.
0
0
Why C?? Any references
0
0
Ans: C
https://www-01.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html
0
0
c
http://java.boot.by/ibm-255/ch07s04.html
0
0
C
0
0