Analysis indicated an unauthorized change to the software circumvented technological protection measures.
The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?
A. HIPS
B. FIM
C. TPM
D. DLP