Given the two security constraints in a deployment descriptor:
101.<security-constraint>
102.<!--a correct url-pattern and http-method goes here-->
103.<auth-constraint><role-name>SALES</role-name></auth- . <auth-constraint>
104.<role-name>SALES</role-name>
105.</auth-constraint>
106.</security-constraint>
107.<security-constraint>
108.<!--a correct url-pattern and http-method goes here-->
109.<!-- Insert an auth-constraint here -->
110.</security-constraint>
If the two security constraints have the same url-pattern and http-method
which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
A.<auth-constraint/>
B.<auth-constraint><role-name>*</role-name></auth-constraint>
C.<auth-constraint><role-name>ANY</role-name></auth-constraint>
D.<auth-constraint><role-name>MARKETING</role-name></auth-constraint>