Which of the following attempts to inhibit an application from being trojanized and proliferating?
A.
Tamper protection in code.
B.
Encrypting config file.
C.
Ensure appropriate permissions are deployed to every component.
D.
Login credentials delivered over network with HTTPS.
Explanation: