Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile device theft?
Which of the following describes how this private key should be stored so that it is protected from theft?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops?
Which of the following is built into the hardware of most laptops but is not setup for centralized management by default?