Alice, a security administrator, needs to verify that the servers in her organization are in a known and trusted state before they process sensitive data. The process involves generating a set of measurements that reflect the current state of the servers and comparing them against a set of known good values provided by the vendor. Which of the following best describes the process Alice should implement to meet this requirement?
Setting BIOS passwords to prevent unauthorized changes to hardware settings
Hashing system files at startup and sending the hashes to a central server for comparison
Configuring the servers to enable remote wiping in case they fail a security check
Implementing a Trusted Platform Module (TPM) to perform remote attestation of the servers during boot-up