Given the two security constraints in a deployment descriptor:<br /> 101.<security-constraint><br /> 102.<!--a correct url-pattern and http-method goes here--> <br /> 103.<auth-constraint><role-name>SALES</role-name></auth- . <auth-constraint><br /> 104.<role-name>SALES</role-name><br /> 105.</auth-constraint><br /> 106.</security-constraint><br /> 107.<security-constraint><br /> 108.<!--a correct url-pattern and http-method goes here--> <br /> 109.<!-- Insert an auth-constraint here --><br /> 110.</security-constraint><br /> If the two security constraints have the same url-pattern and http-method<br /> which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to acc
A、<auth-constraint/>
B、<auth-constraint><role-name>*</role-name></auth-constraint>
C、<auth-constraint><role-name>ANY</role-name></auth-constraint>
D、<auth-constraint><role-name>MARKETING</role-name></auth-constraint>