Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a
technique to what?

A.
Interface with the Public Key Infrastructure (PKI)
B.
Improve the quality of security software
C.
Prevent Denial of Service (DoS) attacks
D.
Establish a secure initial state
Reference: http://www.cryptomathic.com/news-events/blog/the-trusted-platform-module-explained
0
0