Posted by: Pdfprep
Post Date: December 5, 2020
Your customer is concerned about the possibility of an attack via hard drive firmware exploits against their server infrastructure.
Which new HPE ProLiant Gen10 technology protests against these attacks?
A . Secure Recovery
B . Common Access Card (CAC) two-factor authentication support
C . Firmware Runtime Validation
D . Commercial National Security Algorithms compliance
Answer: A
Explanation:
Reference: http://www.ingrammicro.be/concrete/files/4115/0970/4854/ProLiant_Gen10_Autumn_2017.pdf (24)
Leave a Reply