单选题You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict

题目
单选题
You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()
A

Create the role with global authentication.

B

Create the role with external authentication.

C

Create the role as a secure application role.

D

Create the role as a password-protected role.

E

Create a role and use Fine-Grained Access Control (FGAC) to secure the role.


相似考题