Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to
ensure that the software will not be modified by a third party or end users before being installed on mobile
devices. Which of the following should Ann implement to stop modified copies of her software from running on
mobile devices?
A.
Single sign-on
B.
Identity propagation
C.
Remote attestation
D.
Secure code review