An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should the administrator use to fulfil the requirements?

A. AES
B. TPM
C. FDE
D. PAM


Answer: B. TPM

Computer Science & Information Technology

You might also like to view...

What words are displayed in the list box by the following program segment?

``` Dim deadlySins() As String = {"pride", 'greed', "anger", "envy", "lust", "gluttony", "sloth"} Dim query = From sin in deadlySins Order By sin.Length Descending Select sin.ToUpper lstBox.Items.Add(query.First) lstBox.Items.Add(query.Min) ``` (A) GLUTTONY and GLUTTONY (B) GLUTTONY and SLOTH (C) GLUTTONY and ANGER (D) PRIDE and ENVY

Computer Science & Information Technology

When you first place an image on a page, it has the ____ alignment.

A. Left B. Right C. Default D. Baseline

Computer Science & Information Technology

A(n) ____ is an effective means of sending information to a specific audience, according to marketing experts.

A. portrait B. template C. album D. postcard

Computer Science & Information Technology

A key modifying assumption in internal control is that the internal control system is the responsibility of management.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology