(A) Verifies integrity of apps installed on the device
(B) Verifies application developers
(C) Injects security code into applications
(D) Rejects apps installed outside of Google Play
This question is a part of Lesson 7 Review from Module 4 of the Android Enterprise Architecture and Implementation. You can find the answers to all the questions asked in this exam in our Android Enterprise Architecture and Implementation Answers page.