A system administrator is securing the company's servers. They want to use a security technology that authenticates the host system hardware. Which technology is used for this security requirement?
A: A TPM chip is located on a computer's motherboard as a dedicated processor. Cryptographic keys store Rivest-Shamir-Adleman (RSA) encryption keys specific to the host system for hardware authentication.
Source: https://www.techtarget.com/whatis/definition/trusted-platform-module-TPM#:~:text=A%20Trusted%20Platform%20Module%20(TPM)%20is%20a%20specialized%20chip%20on,like%20firmware%20and%20ransomware%20attacks.
This section is not available anymore. Please use the main Exam Page.DEA-41T1 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
lobana
Highly Voted 4 years agovincentv1985
Most Recent 2 years, 5 months agochiocg
2 years, 5 months agoStorageGuy
3 years, 1 month ago