In order to use the TrustZone capabilities (TEE operations and features), we have to use one "Secure OS": Trusty OS, OP-TEE OS, SierraTEE. The secure boot process, that starts at ROM, has some phases and initializes the Secure OS before the "Rich OS" (insecure OS). Once both are initialized, the Client Applications at Normal World (Rich OS) can communicate with the Trusted Applications at Secure World (Secure OS) by using the TEE Driver. For your first question, I think we can observe the boot process to observe which Secure OS is initialized. My little knowledge lead me to think that there is no command we can run to discover this information, since the communication between two worlds is made by the TEE Driver.
Regarding multiple TEE OS running on same device, you would have to change the way secure boot is executed, to add the order of Secure OSes initialization, and you would need specific drivers for communication with each Secure OS or a general driver responsible to communicate with all of them. I do not know why you should want to have many TEE OS running, but I know that you can run many TAs (Trusted Applications) at same time in a Secure OS.
To work with Trusty, you have to check if the Android version supports it. Also, you have to check if TrustZone is enabled at your device (many devices have the technology, but they are sold with it disabled).
At the Normal World you can not list the Trusted Applications running at the Secure World. You can list all the Client Applications that are running at Normal World. But these surely can connect to specific Trusted Applications running at Secure World.