A. authorization B. data integrity C. confidentiality D. authentication
A. a base-64 encoded user name and password B. a form that POSTs to the j_security_check URL C. an applet that requests the user name and password from the user D. a hidden field that supplies the login-constraint used by the application
A. id B. type C. name D. class E. scope F. create