Let me begin by describing a number of problem scenarios in which I would like you to pick a possible solution to the problem (there is no definitive answer just degrees of accuracy).
Scenario 1: Your organisation has a number of computers, PCs and laptops. The laptops have been specially configured to meet your organisation's needs. The configurations consist of a set of security modules, encryption modules, specialist modelling applications and some office products. The hardware has been augmented to enhance the security features on the machines.
...