A security manager is developing security requirements for new end user workstations and wishes to have a secure crypto processor in systems to support security. What should the security manager specify be present?
a. Trusted Computing Base
b. Reference monitor
c. Trusted Module Platform
d. Trusted Platform Module
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here