To protect the sample schema accounts from an unauthorized user access, these accounts are _____.
A.
not granted any role initially
B.
operating system (OS) authenticated
C.
initially locked with their passwords expired
D.
created with their passwords stored in a password file