Which of the following uses a secure crypto-processor to authenticate hardware devices such as a PC or laptop?
a. Public key infrastructure
b. Full disk encryption
c. File-level encryption
d. Trusted Platform Module
Answer: D
Trusted Platform Module (TPM) refers to a secure crypto-processor used to authenticate hardware devices such as a PC or laptop. The idea behind TPM is to allow any encryption-enabled application to take advantage of the chip. Answer A is incorrect because public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Answer B is incorrect because full-disk encryption involves encrypting the operating system partition on a computer and then booting and running with the system drive encrypted at all times. Answer C is incorrect because in file- or folder-level encryption, individual files or folders are encrypted by the file system itself.
Learn More :
Cryptography Implementation
- Which of the following is one of the biggest challenges associated with database encryption?
- One disadvantage of decentralized key generation is:
- Which of the following is an attack against the algorithm?
- In a bridge trust model, each intermediate CA trusts only those CAs that are:
- Which of the following is responsible for issuing certificates?
- Public Key Infrastructure (PKI) is a first attempt to provide all the aspects of security to messages and transactions that have been previously discussed. It contains four components including:
- Key destruction is the process of destroying keys that have become:
- Key management includes all of the following stages/areas except:
- The mesh trust model is also known as what?
- In a bridge trust model, a ______ to ______ relationship exists between the root CAs.
- A hierarchical trust model is also known as a:
- Which of the following refers to the ability to manage individual resources in the CA network?