March 2008
Intermediate to advanced
911 pages
20h 31m
English
Which security mechanisms always operate independently of the transport layer? (Choose all that apply.)
| A. | authorization |
| B. | data integrity |
| C. | authentication |
| D. | confidentiality |
Given a deployment descriptor with three valid <security-constraint> elements, all constraining web resource A, whose respective <auth-constraint> sub-elements are:
<auth-constraint> <role-name>Bob</role-name> </auth-constraint> <auth-constraint/> <auth-constraint> <role-name>Alice</role-name> </auth-constraint>
Who can access resource A?
| A. | no one |
| B. | anyone |
| C. | only Bob |
| D. | only Alice |
| E. | only Bob and Alice |
F. | anyone ... |