3.4 TPM and HSM Flashcards

1
Q

What is a Hardware Root of Trust (RoT)?

A

The foundation for secure operations in a computing system, ensuring secure boot and system integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of a Trusted Platform Module (TPM)?

A

To provide secure storage for cryptographic keys and support system security features like secure boot and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of cryptographic operations does TPM support?

A

Random number generation, RSA key generation, encryption, and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does TPM enhance full-disk encryption tools like BitLocker?

A

By securely storing encryption keys and ensuring the system is not tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is TPM typically managed in a system?

A

In UEFI settings or through operating system tools like tpm.msc in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Hardware Security Module (HSM)?

A

A physical device for secure cryptographic key generation and storage, often used in enterprise environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the common forms of HSMs?

A

Internal cards, rack-mounted systems, and USB-based devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does HSM minimize human error in encryption processes?

A

By automating cryptographic key management and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary use of HSMs?

A

Securing sensitive data and supporting large-scale cryptographic operations in enterprises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between TPM and HSM in terms of integration?

A

TPM is embedded in most modern motherboards, while HSM is a standalone appliance or external device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does TPM ensure system integrity during boot?

A

By verifying firmware and operating system integrity via secure boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What key feature makes HSM ideal for enterprise encryption?

A

It provides secure, automated encryption and decryption with minimal human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the Endorsement Key (EK) in TPM?

A

It is a unique, unchangeable key used for system authentication and security operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security protocols rely on TPM?

A

Secure boot, full-disk encryption, and cryptographic key protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When should HSMs be deployed instead of TPMs?

A

In high-security environments requiring advanced encryption and large-scale cryptographic processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to keep firmware updated for TPM and HSM?

A

To support the latest security protocols and features.

17
Q

How is a TPM enabled or disabled?

A

Through UEFI settings.

18
Q

What is the main advantage of using an HSM in sensitive environments?

A

Enhanced protection for encryption keys, minimizing insider threats and tampering.

19
Q

What are the primary roles of TPM and HSM in cybersecurity?

A

TPM secures boot integrity and encrypts storage, while HSM handles enterprise encryption and key management.