There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
Answer:
The deployment method to use is called Zero touch deployment
Explanation:
Zero-touch deployment or installation is considered as a high volume installation procedure for large and medium organizations. Many computers are configured remotely through the help of the command line. With this process computers are deployed often and quickly because the installations are automated.
The benefits of zero-touch deployment include the following:
- Easy distribution of computer resources. Resources are scarce in business, hence, there is a great need to be able to recycle business resources as often and quickly as possible.
- Reduces operational costs. Businesses are focused on reducing the operational cost to the barest minimum because deployment can be easily managed by internal staff, deploying zero-touch deployment will greatly reduce operational cost.
<u>The possible consequences of intentional virus setting:</u>
Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other to different process such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop and tablet.
To avoid or protect the computer there are two type of antivirus.
- On desktop or tablet or laptop. (It is called resident firewall).
- Internet gateway. (It is called firewall)
So company create virus and to rectify they make money of that process.
To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.