X and Y are developing a utility for a Client project. Though not permitted by the client, X copies the input file from the Client environment and sends it to Y via Infosys email. Y completes the Ul testing using the input file sent by X and finally uploads the developed utility source code on a public GitHub repository.Considering above scenario, identify all the violations in this scenario which could trigger a security incident?
A. Uploading the source code on the public GitHub repository
B. Testing without improper test cases
C. Sending Client Information via Infosys email ID
D. Collaborating on developing a utility for a Client project
E. Copying input file from Client environment and sharing it with a colleague on his personal email ID for Ul testing
a. A,B and E
b. A,C and D
c. A, D and f
D. Cand E
e. A and C.