Respuesta :

Answer:

Option B (TPM) is the appropriate choice.

Explanation:

  • A TPM seems to be a specific form of the protected crypto operating system which seems to be a specialized piece of hardware being used to perform cryptographic techniques such as collecting encrypted data to classified material that is typically was used to validate hardware by either the host machine.
  • The pairing is kept or inside the chip as well as therefore can not be software-accessed.

Other alternatives given weren't concerning the circumstance mentioned. So the response to the above seems to be the right one.