Which of the following technologies when applied to android and iOS environments, can an organization
use to add security restrictions and encryption to existing mobile applications? (Select Two)

A.
Mobile device management
B.
Containerization
C.
Application whitelisting
D.
Application wrappingE. Mobile application store