Which of the following technologies when applied to android and iOS environments, can an organization use to add security restrictions and encryption to existing
mobile applications? (Select Two)

A.
Mobile device management
B.
Containerization
C.
Application whitelisting
D.
Application wrapping
E.
Mobile application store