✅ 4.1 Flashcards

(46 cards)

1
Q

What is measured boot? (TPM)

A

A TPM process that checks hashes of critical boot components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens if TPM detects tampering?

A

System integrity validation fails (may block boot or trigger alert).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between TPM and encryption?

A

TPM stores cryptographic keys and verifies integrity; encryption scrambles data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does HSM stand for and what does it do?

A

Hardware Security Module.
It securely stores cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is an HSM different from TPM?

A

HSM stores and protects keys externally; TPM verifies system integrity and stores keys on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a boot password do?

A

Requires authentication before the OS loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does a boot password verify firmware integrity?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does encryption verify firmware during boot?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component helps protect BitLocker keys?

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is TPM typically located?

A

On the motherboard (or firmware-based in modern systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exam keyword: compares hashes during boot = ?

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exam trap: secure key storage USB device = ?

A

HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exam trap: requires password before OS loads = ?

A

Boot password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exam trap: scrambles data to prevent reading = ?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does PXE stand for?

A

Preboot Execution Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is PXE used for?

A

Booting a computer over the network from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where is PXE configured?

A

In BIOS/UEFI boot order settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exam keyword: boot from network adapter = ?

A

PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exam keyword: prevents boot-level malware = ?

20
Q

What does TPM primarily do?

A

Stores cryptographic keys and verifies system integrity.

21
Q

Does TPM stop malware from loading?

A

No. It measures integrity but does not block execution.

22
Q

What is the difference between TPM and Secure Boot?

A

TPM measures and stores keys; Secure Boot blocks unauthorized boot code.

23
Q

What does a boot password do?

A

Requires authentication before OS loads.

24
Q

Does a boot password prevent bootloader malware?

25
Exam trap: stop malware from hijacking boot process = ?
Secure Boot
26
Exam trap: store BitLocker keys and compare hashes = ?
TPM
27
Secure Boot. (4 things)
1. UEFI Feature. 2. Prevents unauthorized or unsigned OS loaders from running during boot. 3. Verifies digital signatures of boot loaders and system files. 4. Prevents malware from hijacking the boot process.
28
What is the FIRST step in the CompTIA troubleshooting methodology?
Gather information
29
DELETE
DELETE
30
DELETE
DELETE
31
DELETE
DELETE
32
When do you determine the appropriate fix?
After testing the hypothesis
33
When do you implement the solution?
After confirming the hypothesis
34
What should you do AFTER implementing a fix?
Verify full system functionality and implement preventive measures
35
What is the FINAL step in troubleshooting?
Document findings
36
Delete
Delete
37
Delete
Delete
38
Delete
Delete
39
What common mistake do students make with troubleshooting questions?
Jumping to the fix too early
40
Troubleshooting methodology follows what kind of approach?
Structured and sequential
41
What is Step 1 of troubleshooting?
Identify the problem (Gather information)
42
What is Step 2 of troubleshooting?
Establish a theory of probable cause
43
What is Step 3 of troubleshooting?
Test the theory to determine cause
44
What is Step 4 of troubleshooting?
Establish a plan of action and implement the solution
45
What is Step 5 of troubleshooting?
Verify full system functionality
46
What is Step 6 of troubleshooting?
Document findings