examines this system's processor to determine which of three useful security features are available.