Which of the following would best describe the purpose of a trusted platform module?

A. A module that verifies the authenticity of a guest host
B. A computer facility with cryptographic processing power
C. A dedicated microprocessor that offloads cryptographic processing from the CPU while storing cryptographic keys
D. The part of the operating system that must be invoked all the time and is referred to as a security kernel


Answer: C. A dedicated microprocessor that offloads cryptographic processing from the CPU while storing cryptographic keys

Computer Science & Information Technology

You might also like to view...

Any intangible asset that consists of human knowledge and ideas is _______.

A. cyber property B. personal property C. intellectual property D. real property

Computer Science & Information Technology

On the ____ panel, if you click a swatch, the foreground changes to that color.

A. Colors B. Swatches C. Hue / Saturation D. None of the above

Computer Science & Information Technology

Table style options include separate formatting settings for row and column headers, alternate rows or columns, and summary rows or columns

Indicate whether the statement is true or false

Computer Science & Information Technology

Case 9-1Olive is creating lists on a Web page.Olive uses the tag

    to create a ____ list.

    A. definition B. numbered C. bulleted D. nested

Computer Science & Information Technology