A system administrator is securing the company's servers. They want to use a security technology that authenticates the host system hardware. Which technology is used for this security requirement?
A: A TPM chip is located on a computer's motherboard as a dedicated processor. Cryptographic keys store Rivest-Shamir-Adleman (RSA) encryption keys specific to the host system for hardware authentication.
Source: https://www.techtarget.com/whatis/definition/trusted-platform-module-TPM#:~:text=A%20Trusted%20Platform%20Module%20(TPM)%20is%20a%20specialized%20chip%20on,like%20firmware%20and%20ransomware%20attacks.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
lobana
Highly Voted 3 years, 9 months agovincentv1985
Most Recent 2 years, 2 months agochiocg
2 years, 2 months agoStorageGuy
2 years, 10 months ago