Which of the following technologies when applied to android and iOS environments, can an
organization use to add security restrictions and encryption to existing mobile applications? (Select
Two)

A.
Mobile device management
B.
Containerization
C.
Application whitelisting
D.
Application wrapping
E.
Mobile application store