TEMPEST is a hardware for which of the following purposes?
None of the choices.
Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified
by a malicious person. Even machines that operate as a closed system can be eavesdropped upon
via monitoring the faint electromagnetic transmissions generated by the hardware such as