Which of the following is the HIPs policy that allows a generated listing of applications that are known to be safe
and are allowed to perform any normal operation?

A.
Trusted Applications Policy
B.
Local Applications Policy
C.
Safe Applications Policy
D.
Host Application