An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should the administrator use to fulfil the requirements?
A. AES
B. TPM
C. FDE
D. PAM
Answer: B. TPM
You might also like to view...
What words are displayed in the list box by the following program segment?
``` Dim deadlySins() As String = {"pride", 'greed', "anger", "envy", "lust", "gluttony", "sloth"} Dim query = From sin in deadlySins Order By sin.Length Descending Select sin.ToUpper lstBox.Items.Add(query.First) lstBox.Items.Add(query.Min) ``` (A) GLUTTONY and GLUTTONY (B) GLUTTONY and SLOTH (C) GLUTTONY and ANGER (D) PRIDE and ENVY
A(n) ____ is an effective means of sending information to a specific audience, according to marketing experts.
A. portrait B. template C. album D. postcard
A key modifying assumption in internal control is that the internal control system is the responsibility of management.
Answer the following statement true (T) or false (F)
When you first place an image on a page, it has the ____ alignment.
A. Left B. Right C. Default D. Baseline