Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a
technique to what?
A.
Interface with the Public Key Infrastructure (PKI)
B.
Improve the quality of security software
C.
Prevent Denial of Service (DoS) attacks
D.
Establish a secure initial state
Establish a secure initial state in what? Sounds like it has something more to do with cryptography keys.
Reference: https://en.wikipedia.org/wiki/Trusted_Platform_Module