Which five statements about SecurityManager are true? (Choose five.)
A.
The SecurityManager must be instantiated to use RMI.
B.
The SecurityManager object can be discarded after loading.
C.
The SecurityManager can be configured from a per-user file.
D.
The SecurityManager can be configured from a system-wide file.
E.
The SecurityManager object can be installed in the application code.
F.
The SecurityManager object can be installed from the command line.
G.
The SecurityManager can be configured from a file specified on the command line.