Yes - B
TPM is in-built chip on motherboard such as iPhone calls it T2 while HSM is external hardware device that can be removed. HSM usage is usually for datacentres while TPM focus on endpoint/ device/ machine.
Not A. BitLocker is a full disk encryption tool that can use TPM to protect keys, but it does not include a root key itself — it relies on TPM for that.
Not C. VSAN is a virtualized storage infrastructure concept, not a cryptographic or key management solution.
Not D. HSM can manage root keys, but it is typically used in enterprise or server environments, not individual endpoints.
TPM is a hardware component that stores cryptographic keys securely, including the root key used for encryption, but by itself, it is not an encryption solution.
changing to A, just realised that the keyword is encryption. and bitlocker only provide encryption when TPM is used along with bitlocker it uses root key. but TPM itself is not a encryption method.
The solution that includes a root key is:
B. Trusted Platform Module (TPM).
A Trusted Platform Module (TPM) is a hardware-based security device that provides secure generation and storage of cryptographic keys, including root keys. It is designed to ensure the integrity of the platform and can be used to securely encrypt data on an endpoint.
While BitLocker is a robust encryption solution, it does not inherently include a root key. BitLocker works in conjunction with a Trusted Platform Module (TPM) to provide enhanced security, but the TPM is the component that generates and stores the root key. BitLocker itself is a software feature that encrypts entire volumes and relies on the TPM for secure key management.
In contrast, the TPM is specifically designed to generate, store, and manage cryptographic keys, including root keys, making it the correct answer for a solution that includes a root key.
A Trusted Platform Module (TPM) is a hardware-based security feature that includes a root key stored in a secure cryptographic processor. TPM is used for encryption, secure boot, and system integrity verification. It helps in securely encrypting data on endpoints by managing encryption keys, such as those used by BitLocker in Windows.
While BitLocker can leverage TPM for secure key storage and encryption, it does not include a root key itself. The root key comes from the TPM, not BitLocker.
BitLocker is a full disk encryption feature built into Windows that uses a root key to encrypt the data on an endpoint. The root key is typically protected using a Trusted Platform Module (TPM) chip, which provides hardware-based security for the encryption keys, ensuring that they are not easily accessible or tampered with.
Comparison:
TPM:
Integrated into endpoint devices.
Secure storage of root keys.
Used for disk encryption (e.g., BitLocker).
Cost-effective for individual devices.
HSM:
External hardware used in server environments.
Provides high-security key management for enterprise applications.
More expensive and complex to implement on individual endpoints.
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Arunlab
Highly Voted 2 years, 5 months agocmakiva
1 year, 6 months agostickerbush1970
Highly Voted 2 years, 7 months agodev46
2 years, 7 months agojackdryan
1 year, 11 months agoRedMartian
Most Recent 4 weeks, 1 day agoKjee
1 month agoamitsir
1 month, 1 week agoamitsir
1 month, 1 week agoImranbhatti
1 month, 3 weeks agoEdsaasa
1 month, 3 weeks agoRider2053
2 months, 1 week agoBau24
2 months, 3 weeks agoMustardHead
3 months, 3 weeks agoSocca
4 months agoRFULL
6 months agodeeden
9 months ago8b48948
1 year agoVasyamba1
1 year, 1 month agohomeysl
1 year, 1 month ago