Notifications
Clear all
Topic starter
An analyst needs to provide a recommendation that will allow a custom-developed application to have full access to the system's processors and peripherals but still be contained securely from other applications that will be developed .
Which of the following is the BEST technology for the analyst to recommend?
- A . Software-based drive encryption
B. Hardware security module
C. Unified Extensible Firmware Interface
D. Trusted execution environment
Suggested Answer: D
Posted : 11/02/2023 12:52 pm