Which of the following uses a secure crypto-processor to authenticate hardware devices such as a PC or laptop?

Which of the following uses a secure crypto-processor to authenticate hardware devices such as a PC or laptop?




a. Public key infrastructure
b. Full disk encryption
c. File-level encryption
d. Trusted Platform Module




Answer: D

Trusted Platform Module (TPM) refers to a secure crypto-processor used to authenticate hardware devices such as a PC or laptop. The idea behind TPM is to allow any encryption-enabled application to take advantage of the chip. Answer A is incorrect because public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Answer B is incorrect because full-disk encryption involves encrypting the operating system partition on a computer and then booting and running with the system drive encrypted at all times. Answer C is incorrect because in file- or folder-level encryption, individual files or folders are encrypted by the file system itself.


Learn More :

Learn More Multiple Choice Question :