BIOS Flashcards

1
Q

What is secure boot?

A

a security feature implemented in modern computers (those running windows 8 and later) that helps protect the boot process from unathuthorized and potentially malicious software. It works by ensuring that only trusted and digitally signed software components are allowed to run during the system startup process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does secure boot do?

A

it verifies the bootloader, checks the OS bootloaders digital signature. The bootloader must be signed with a trusted certificate or a manually approved digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what happens if you’re using an OS that doesnt support secure boot?

A

you may need to modify that in the BIOS itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is CMOS?

A

Complementary Metal Oxide Semiconductor. CMOS ususally refers to a specific part of a computers hardware known as the CMOS chip or CMOS battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

where is BIOS configuration stored?

A

in flash memory thats connected to the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how can you reset your BIOS configuration?

A

through a jumper on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a jumper?

A

located on the motherboard, a jumper is a small plastic covered connector that can be positioned over two or more pins to change the configuration or the behaviour of a specific hardware feature or component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are jumpers used for?

A

to configure various settings on the motherboard or other hardware devices by altering the flow of electrical signals between different parts of the circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a CMOS battery?

A

not used with todays flash based storage, it maintains older BIOS configurationa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the Trusted Platform Module

A

a specification for cryptographic functions. a hardware based security component that provides a variety of security related functions to help enhance the overall seurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

where is the TPM typically implemented?

A

as a microcontroller on the motherboard or as a separate chip in devices such as laptops, desktops and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the primary purpose of TPM?

A

To securely store and manage cryptographic keys as well as perform various security related tasks, such as encryption, authentication and secure boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how is creating a cryptographic key done?

A

through the TPM on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is persistent memory?

A

also known as storage class memory (SCM) or non volatile memory (NVM) is a type of memory that bridges the cap between traditional volatile memory (RAM) and non volatile storage (such as SSD and HDD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does persistent memory offer?

A

characteristics of both memory and storage, providing high speed data access like RAM while also retaining data even when the power is turned off, like storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

whats persistent memory most useful for?

A

for applications that require low latency and high throughput data processing. Its most useful for workloads involving large data bases, real time analytics, caching and other scenarios where quick access to data is crucial.

17
Q

What is HSM?

A

Hardware Security Module. a specialized hardware device designed to provide robust and high level security for managing cryptographic keys, securing sensitive data and performing various cryptographic functions.

18
Q

where are HSMs most often used?

A

enterprise enviroments, financial institurions, government agencies and other organizations that require stringent security.

19
Q

what is a cryptographic accelerator?

A

a co processor designed specifically to perform computationally intensive cryptographic operations in computing systems. This means you can offload some of the cryptographic functions used by your servers on the HSM which would increase the overall throughput of your applications.