posted 13 years ago
Hi all,
In the Head First (2nd edition) book, the same mock exam at the back, page 823, Question 43 is as below:
Given that a deployment descriptor has only one security role, defined as:
<security-role>
<role-name>Member</role-name>
</security-role>
Which are valid <auth-constraint> elements that will allow users to access resources constrained by the security role declared ? (choose all that apply)
A: <auth-constraint/>
B: <auth-constraint>*</auth-constraint>
C: <auth-constraint>Member</auth-constraint>
D: <auth-constraint>MEMBER</auth-constraint>
E: <auth-constraint>"Member"</auth-constraint>
The answer given is B and C. I would have thought the correct answer was only B. The reason I say this is that can you specify the role name in auth-constraint without putting the role name inside a <role-name> ? I thought not. I check the errata but found no mention of it.
I would have though that if B was as below then it would be correct:
<auth-constraint>
<role-name>Member</role-name>
</auth-constraint>
Any thoughts/advice would be great.
Thanks - Ro