Your customer is concerned about the possibility of an attack via hard drive firmware exploits against their server infrastructure.
Which new HPE ProLiant Gen10 technology protests against these attacks?
A . Secure Recovery
B . Common Access Card (CAC) two-factor authentication support
C . Firmware Runtime Validation
D . Commercial National Security Algorithms compliance
Answer: A
Explanation:
Reference: http://www.ingrammicro.be/concrete/files/4115/0970/4854/ProLiant_Gen10_Autumn_2017.pdf (24)