Bios/UEFI Flashcards

1
Q

What is ROM and what is its primary function?

A

ROM (Read-Only Memory) is a non-volatile memory that stores the BIOS, which is essential for the system to boot. It can be updated through a process called flashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of CMOS in a system?

A

CMOS stores BIOS/UEFI settings such as date, time, and boot order. It provides persistent storage for configuration data that is retained even when the system is powered off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of the CMOS battery?

A

The CMOS battery (e.g., CR2032) powers the CMOS chip, allowing it to retain BIOS settings when the system is turned off. The battery typically lasts 3-10 years, depending on the system’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens when the CMOS battery fails?

A

A failed CMOS battery results in the loss of BIOS settings, leading to issues like incorrect date and time, and the need to reconfigure BIOS settings every time the system is powered on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Power-On Self-Test (POST) and what does it do?

A

POST is an initial hardware check that occurs when the computer is powered on. It tests essential components such as the keyboard, RAM, storage devices, and CPU to ensure they are functioning properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the system report errors during POST?

A

Errors are reported through text messages on the display or beep codes (if there is no display). These codes vary by motherboard and BIOS manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do beep codes indicate during POST?

A

Beep codes indicate hardware issues. For example, two short and one long beep might signal a keyboard issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between BIOS and UEFI in terms of system bit support?

A

BIOS supports only 32-bit, while UEFI supports both 32-bit and 64-bit systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the storage limits of BIOS and UEFI?

A

BIOS supports drives up to 2.2 TB, while UEFI supports drives up to 9.4 zettabytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What partition table does BIOS use compared to UEFI?

A

BIOS uses the Master Boot Record (MBR), while UEFI uses the GUID Partition Table (GPT), which allows for more partitions and larger drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the boot speed of BIOS compare to UEFI?

A

UEFI boots faster than BIOS due to more efficient hardware initialization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the ROM sizes of BIOS and UEFI differ?

A

UEFI typically has a larger ROM, supporting additional features and diagnostic tools compared to BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the flashing process for updating BIOS/UEFI?

A

Flashing involves downloading the firmware update from the manufacturer, storing it on a USB drive, and following specific instructions (e.g., pressing keys during startup) to apply the update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What precautions should be taken when flashing BIOS/UEFI?

A

Always back up settings before flashing and follow the manufacturer’s instructions precisely to avoid firmware corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does boot order management enhance system security?

A

By configuring the boot order to exclude optical or USB drives, you prevent unauthorized access through external operating systems, such as booting from Linux via USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do corporate environments use boot order restrictions for security?

A

Corporate environments often lock BIOS/UEFI settings and enforce boot order restrictions to prevent unauthorized booting from external devices.

17
Q

What is PXE (Pre-Execution Environment) and how is it used?

A

PXE allows systems to boot from a network server, commonly used in corporate environments for centralized OS loading, such as with thin clients.

18
Q

What is the role of a Supervisor/Admin password in BIOS/UEFI?

A

It restricts access to BIOS/UEFI settings, preventing unauthorized configuration changes, commonly used in corporate environments.

19
Q

What does the User/System password do in BIOS/UEFI?

A

It locks the system at startup, requiring a password to proceed with the boot process, commonly used on personal computers.

20
Q

How does a Storage/Hard Drive password protect a system?

A

It prevents unauthorized access to or booting from a specific drive, though it is less common due to modern security modules.

21
Q

What is the Hardware Root of Trust (RoT)?

A

The Root of Trust is the foundation for secure operations in a computing system, performing cryptographic functions to support secure boot. It is embedded in hardware and typically uses unique keys for digital signatures to verify system integrity.

22
Q

What is the role and function of the Trusted Platform Module (TPM)?

A

TPM is a hardware-based Root of Trust used to securely store digital certificates, encryption keys, and password hashes. It provides boot verification, supports full-disk encryption (e.g., BitLocker), stores and generates keys, and enables encryption/decryption. Key components include Platform Configuration Registers (PCRs) for integrity checks and Attestation Identity Keys (AIKs) for verifying system integrity.

23
Q

What is a Hardware Security Module (HSM) and how is it used?

A

An HSM is a physical device that provides high-security storage for cryptographic keys to protect them from tampering and insider threats. It ensures automated key management, high security for cryptographic operations, and protects keys from unauthorized access. Forms include internal cards, rack-mounted units, and portable USB devices. HSMs are used in environments where TPMs are insufficient, or for systems requiring strict cryptographic isolation.