You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()