Which of the following technologies when applied to android and iOS environments, can an organization use to
add security restrictions and encryption to existing mobile applications? (Choose Two)
A.
Mobile device management
B.
Containerization
C.
Application whitelisting
D.
Application wrapping
E.
Mobile application store