What is the HP trust boundaries feature?
 
A.
the option to change roll-based authentication to identity-based authentication and back via MS 
Active Directory
B.
the capability of encrypting all data coming and going from internal and external storage
C.
the capability of erasing memory by overwriting multiple times to IEEE standards
D.
the capability of placing sensitive files in folders that are hidden and restricted from 
unauthorized users
Explanation:
http://www.cryptomill.com/resources/technology/trust-boundaries.html
 
                