You want to create a role to meet these requirements:
1:The role is to be protected from unauthorized usage.
2:The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles()
A.Create the role with global authentication.
B.Create the role with external authentication.
C.Create the role as a secure application role.
D.Create the role as a password-protected role.
E.Create a role and use Fine-Grained Access Control (FGAC) to secure the role.