Which of the following should the administrator use to …

An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should
the administrator use to fulfill the requirements?

An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should
the administrator use to fulfill the requirements?

A.
AES

B.
TPM

C.
FDE

D.
PAM



Leave a Reply 0

Your email address will not be published. Required fields are marked *

eighteen − three =