Before using the “git commit” command, in the source code, if sensitive information is
identified, in which order the actions to be performed to secure those sensitive data?
A. Use functions in code to read sensitive information from cfg file
B. Copy the sensitive information to a cfg file
C. Add the cfg file to .gitignore file
D. Identify the sensitive information in IDE.