Problem
1. Briefly describe the three basic services provided by a TPMs.
2. What is the aim of evaluating an IT product against a trusted computing evaluation standard?
3. What is the difference between security assurance and security functionality as used in trusted computing evaluation standards?