A hospital IT department wanted to secure its doctor’s tablets. The IT department wants operating
system level security and the ability to secure the data from alteration. Which of the following
methods would MOST likely work?
A.
Cloud storage
B.
Removal Media
C.
TPM
D.
Wiping