Lead2pass has updated the C4040-252 brain dumps recently, Download the free demo in PDF on our website, it would be great help for your IBM C4040-252 exam.
QUESTION 1
When a J2EE enterprise application is being assembled to take advantage of J2EE security, there are a number of configurations and mappings that need to be made.
Which of the following items can a security constraint be mapped to?
A. A security realm
B. An EJB
C. A Web resources
D. A login mechanism