Which of the following could be used to meet this requirement?

A security administrator is implementing a solution that encrypts an employee’s newly purchased laptop but does not require the company to purchase additional hardware or software. Which of the following could be used to meet this requirement?

A security administrator is implementing a solution that encrypts an employee’s newly purchased laptop but does not require the company to purchase additional hardware or software. Which of the following could be used to meet this requirement?

A.
Mobile device encryption

B.
HSM

C.
TPM

D.
USB encryption



Leave a Reply 0

Your email address will not be published. Required fields are marked *