Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile device theft?
Which of the following describes how this private key should be stored so that it is protected from theft?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops?