Community QuestionSeen on 6 CBTs
Hardware root of trust
Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
Answer
a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
Alternate answers seen on other CBTs
The same question shows up worded slightly differently across CBT versions. Here are the other answer variants we've indexed.
is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.
Comptia Certmaster Practice For Security+ →A laptop arrives at the company technology lab with a private key embedded, providing full disk encryption. When matched with a public key, what does this system provide?
Comptia Certmaster Practice For Security+ Sy0 601 →Automatically allow or restrict access when the user is in a specific location
Comptia Sec Plus Objectives →