answersLogoWhite

0


Best Answer

Trusted Platform Module Chip or TPM.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which chip on the motherboard does Windows Bitlocker Encryption use to secure the hard drive?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which chip on the motherboard does Wndows Bitlocker Encryption use to secure the hard drive?

The TPM chip is used to hold the encryption key for Windows Vista BitLocker Encryption. You can lock down a workstation using Windows. Press the


Which chip on the motherboard does window bit-locker encryption use to secure the hard drive?

It uses the trusted platform module (TPM).


What are SFTP clients for Windows used for?

SFTP clients for Windows is used to securely transfer and access files. It uses encryption of both data and commands to ensure secure transfer over any network.


What does ssl encryption stand for?

SSL encryption stands for "Secure Sockets Layer" encryption. It ensures secure encryption of data received and communicated to and from those accessing a website. It is important because many people will refuse to enter essentional information without the assurance of this security.


What encryption technology provides secure tunnels?

vpn


What type of encryption protocol does secure FTP SFTP use to secure FTP transmission?

Secure Shell Protocol


What are advantages and disadvantages of a motherboard?

An advantage of a motherboard is that it provides us with a platform on which we can attach everything we need to make a computer. A disadvantage of a motherboard is a motherboard from a Windows 8 certified computer that has UEFI and Secure Boot enabled which in turn makes it hard (if not impossible to load another operating system like Red Hat or even Windows XP.


Briefly explain the securemail?

It would depend if you are referring to Tiscali SecureMail or Secure Mail a Windows security software that secures your mail communication on PC with strong encryption algorithms


Which connection provides a secure CLI session with encryption to a Cisco switch?

To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.


What is a secure process for keeping confidential information private?

Encryption.


Is a secure process for keeping confidential information private?

Encryption.


Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.