CompTIA Exam Questions

They can achieve this by:

The systems administrator wishes to implement a hardware-based encryption method that could

also be used to sign code. They can achieve this by:

A.
Utilizing the already present TPM.

B.
Configuring secure application sandboxes.

C.
Enforcing whole disk encryption.

D.
Moving data and applications into the cloud.

Explanation:
Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the
system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and
stores cryptographic keys, passwords, or certificates.