You want to create a role to meet these requirements: 1. The role is to be protected from
unauthorized usage. 2. The password of the role is not to be embedded in the application
source code or stored in a table. Which method would you use to restrict enabling of such
roles?
A.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
B.
Create the role as a password-protected role.
C.
Create the role as a secure application role.
D.
Create the role with external authentication.