Which of the following could be used to meet this requirement?

A security administrator is implementing a solution that encrypts an employee’s newly purchased
laptop but does not require the company to purchase additional hardware or software. Which of
the following could be used to meet this requirement?

A security administrator is implementing a solution that encrypts an employee’s newly purchased
laptop but does not require the company to purchase additional hardware or software. Which of
the following could be used to meet this requirement?

A.
Mobile device encryption

B.
HSM

C.
TPM

D.
USB encryption

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *