Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third
party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on
mobile devices?
A.
Single sign-on
B.
Identity propagation
C.
Remote attestation
D.
Secure code review