1⟩ Suppose You are an application developer for Company.com. You are developing an application that canbe extended by using custom components. The application uses reflection to dynamically loadand invoke these custom components. In some cases, custom components will originate from asource that is not fully trusted, such as the Internet.You need to programmatically restrict the code access security policy under which customcomponents run so that custom components do not run with an elevated permission grant.What are two possible ways to achieve this goal? (Each correct answer presents a completesolution. Choose two)A. Create a new application domain and set the security policy level. Run custom components inthis application domain.B. Use permission class operations to modify the security policy.C. Implement custom permission classes to protect custom component resources.D. Programmatically modify the machine-level security policy file after loading a customcomponent.
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.