Which of the following will meet this goal without requ…

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition
to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect
needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules onthe VMs. Which of the following will meet this goal without requiring any hardware pass-through
implementations?

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition
to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect
needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules onthe VMs. Which of the following will meet this goal without requiring any hardware pass-through
implementations?

A.
vTPM

B.
HSM

C.
TPM

D.
INE



Leave a Reply 0

Your email address will not be published. Required fields are marked *