赞题库-背景图
单项选择题

With hundreds of millions of electronic 66 taking place daily, businesses and organizations have a strong incentive to protect the 67 of the data exchanged in this manner, and to positively ensure the 68 of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security 69 that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in 70 and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

69()

A. appliances
B. chips
C. tools
D. means