A Chief Information Officer (CIO) is concerned that encryption keys might be ex filtrate d by a contractor. The CIO wants to keep control over key visibility and management.
Which of the following would be the BEST solution for the CIO to implement?
A . HSM
B . CA
C . SSH
D . SSL
Answer: A
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund