You want to create a role to meet these requirements:
* The role is to be protected from unauthorized usage
* The password of the role is not to be embedded in the application source code or stored in a table
Which method would you use to restrict enabling of such roles?
A.
Create a role as a secure application role
B.
Create the role with external authentication
C.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
D.
Create the role as a password-protected role
I agree with the answer. A