Configure BIOS/UEFI settings Flashcards
What access levels are there regarding security?
Full Access.
Limited Access.
View Only Access.
No Access.
What security features are common to BIOS/UEFI?
Passwords. Drive Encryption. LoJack. Trusted Platform Module (TPM). Secure Boot.
What are the two forms of passwords typically used in the BIOS?
Supervisor Password.
User Password.
What is the difference between the two forms of password?
The supervisor can access everything.
User use is restricted to changing certain things dependent on what is allowed to them.
What is drive encryption?
The encryption of a hard drive. They cannot be easily accessed without the correct password.
What two programs does LoJack consist of?
Persistence Module and Application Agent.
What does the Persistence Module do?
This keeps the BIOS active. It cannot be turned off.
What does the Application Agent do?
Contacts a monitoring center over the internet to report device information and location.
It can also lock the device and delete any information on it.
What is the TPM?
A chip designed to secure hardware by storing encryption keys, digital certificates, passwords and data.
It is used by windows to support BitLocker full-disk encryption.
What is secure boot?
It is a UEFI security standard.
It ensures a motherboard only boots an OS that is trusted by the manufacturer.
Where was early BIOS computer information stored?
ROM chips.
What should you do when installing a new BIOS?
Consult the manufacturers website and check the installation instructions there.
What forms can installing a new BIOS take?
Downloading a new BIOS file.
copying or extracting files to removeable media. Then booting from the removeable media.
Installation program.
Why can updating firmware be risky?
Because if done incorrectly, it can cause a computer to become unusable.
What are the benefits of updating the BIOS?
Product upgrades.
Compatibility Improvements.
Bug Fixes.