Demonstrates how the order in which the interceptors are invoked can be altered using the deployment descriptor.