Which of the following BEST describes HSM?
A . A computing device that manages cryptography, decrypts traffic, and maintains library calls
B . A computing device that manages digital keys, performs encryption/decryption functions, and maintains other cryptographic functions
C . A computing device that manages physical keys, encrypts devices, and creates strong cryptographic functions
D . A computing device that manages algorithms, performs entropy functions, and maintains digital signatures
Answer: B
Explanation:
HSM (Hardware Security Module) is a computing device that manages digital keys, performs encryption/decryption functions, and maintains other cryptographic functions2. HSM is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. HSM can store cryptographic keys that are used for encryption, authentication, digital signatures, and other security functions. HSM can also generate random keys that are unique to each device and never leave the chip. HSM can protect these keys from unauthorized access or tampering by using hardware isolation and encryption3. HSM can also measure and verify the integrity of the operating system and firmware on a device by using a process called attestation. HSM does not manage cryptography (A), as cryptography is the science or art of creating and using secret codes. HSM does not manage physical keys ©, as physical keys are tangible objects that are used to lock or unlock something. HSM does not manage algorithms (D), as algorithms are sets of rules or instructions that are used to solve problems or perform tasks.
Reference:
2: https://www.techopedia.com/definition/24771/technical-controls
3: https://www.techopedia.com/definition/25888/security-development-lifecycle-sdl
Latest CS0-002 Dumps Valid Version with 220 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund