You export five modified system security roles from a development environment as an unmanaged solution. You solution into a production environment. Which of the following statements is true regarding the import of the unmanaged solution?
A. Copies of security roles will be created automatically in the production environment. B. The system security roles in production will be overwritten with the settings imported from the solution. C. Security roles cannot be imported. D. The import will fail because system security roles cannot be overwritten by importing a solution.