You are analyzing the different methods available to manage the life cycle of the OWSM policies in your SOA/BPM environment. Identify two statements that correctly describe OWSM policy attachments. (Choose two.)
A
Although you can boss attach and detach security policies in JDeveloper, you can detach them only in Enterprise Manager.
B
An application developer typically uses JDeveloper to create new security policies rather than select them from a prebuilt list.
C
When you use JDeveloper to associate a security policy with a web service, the policy is not really attached until application development.
D
OWSM policies can be attached and detached with WLST.
Show Answer