Android devices utilize a __________, to run privileged or security-sensitive operations such as PIN verification, secure storage of encryption keys and Verified Boot.
- Tamper Resistant Zone
- Trusted Execution Environment
- Trusted Encryption Zone
- Secure Execution Environment