A hospital IT department wanted to secure its doctor’s tablets. The IT department wants operating
system level security and the ability to secure the data from alteration. Which of the following
methods would MOST likely work?
A.
Cloud storage
B.
Removal Media
C.
TPM
D.
Wiping
Explanation:
Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the
system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and
stores cryptographic keys, passwords, or certificates.