A hospital IT department wanted to secure its doctor’s tablets. The IT department wants operating system level
security and the ability to secure the data from alteration. Which of the following methods would MOST likely
Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s
motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic
keys, passwords, or certificates.