The systems administrator wishes to implement a hardware-based encryption method that could
also be used to sign code. They can achieve this by:
A.
Utilizing the already present TPM.
B.
Configuring secure application sandboxes.
C.
Enforcing whole disk encryption.
D.
Moving data and applications into the cloud.