nerdexam
(ISC)2(ISC)2

CISSP · Question #738

CISSP Question #738: Real Exam Question with Answer & Explanation

The correct answer is D: Establish a secure initial state. Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to establish a secure initial state. A TPM is a hardware device that provides cryptographic functions and secure storage for keys, certificates, passwords, and other sensitiv

Submitted by valeria.br· Mar 5, 2026Security Architecture and Engineering

Question

Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?

Options

  • AInterface with the Public Key Infrastructure (PKI)
  • BImprove the quality of security software
  • CPrevent Denial of Service (DoS) attacks
  • DEstablish a secure initial state

Explanation

Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to establish a secure initial state. A TPM is a hardware device that provides cryptographic functions and secure storage for keys, certificates, passwords, and other sensitive data. A TPM can also measure and verify the integrity of the system components, such as the BIOS, boot loader, operating system, and applications, before they are executed. This process is known as trusted boot or measured boot, and it ensures that the system is in a known and trusted state before allowing access to the user or network. A TPM can also enable features such as disk encryption, remote attestation, and platform authentication.

Topics

#Trusted Platform Module (TPM)#secure boot#hardware security#trusted computing

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions