Which of the following should the administrator use to fulfil the requirements?

An administrator wants to provide onboard hardware based cryptographic processing and secure
key storage for full-disk encryption. Which of the following should the administrator use to fulfil the
requirements?

An administrator wants to provide onboard hardware based cryptographic processing and secure
key storage for full-disk encryption. Which of the following should the administrator use to fulfil the
requirements?

A.
AES

B.
TPM

C.
FDE

D.
PAM

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *

eleven − two =