单选题You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict
题目
单选题
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
A
Create the role with global authentication.
B
Create the role with external authentication.
C
Create the role as a secure application role.
D
Create the role as a password-protected role.
E
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.