Which of the following security chips does BitLocker utilize?
A. BIOS
B. CPU
C. CMOS
D. TPM
Ans: D. TPM
You might also like to view...
Answer the following questions true (T) or false (F)
1. True/False: In a storage location of 8 bits, a sign-and-magnitude integer could be any integer from 0 to 15, inclusive. 2. True/False: The range of integers that can be stored in one’s complement format is exactly double the range that can be stored in sign-and-magnitude format. 3. True/False: Oneproblem with using one’s complement to store integers is that there are two ways to represent 0 .
Which of the following is not a rule that must be followed when naming identifiers?
a. After the first character, you may use the letters a-z, A-Z, an underscore, a dollar sign, or the digits 0-9. b. Identifiers can contain spaces. c. Uppercase and lowercase characters are distinct. d. The first character must be one of the letters a-z, A-Z, an underscore, or a dollar sign.
A primary benefit of creating a PivotTable is that you can rearrange or ________ fields to view and summarize data from different perspectives
Fill in the blank(s) with correct word
In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels. What were these two levels? (Select all that apply)
A. File Scan B. Read Only C. Full Control D. Write Only E. Both B and C