BIOS updates are performed in order to
The main functionality
of the Basic Input/Output System (BIOS) is to perform the initial hardware
checks after the computer is powered on and start up the operating system.
·
True
Which of the following
resources can be used by an Operating System (OS) to communicate with hardware?
(Select 2 answers)
·
Device drivers, System
BIOS
In modern PCs, the
procedure of replacing BIOS contents is sometimes referred to as:
·
Flashing the BIOS
BIOS updates are
performed in order to: (Select all that apply)
·
Repair damaged BIOS,
Provide support for new types of attached hardware
Which of the following
terms refer to BIOS types that can be updated without removing the BIOS chip
from a motherboard? (Select 2 answers)
·
EEPROM, Flash Memory
Which Microsoft
Windows OS utility can be used to view basic information about computer's BIOS?
·
MSINFO32.EXE
Power failure during
BIOS upgrade can be the cause of irreversible damage to the computer system.
·
True
After a normal system
shutdown, when the computer is turned off, contents of the memory used to store
BIOS settings are:
·
Retained
Which of the acronyms
listed below refers to a series of basic hardware diagnostic tests performed by
the startup BIOS after the computer is powered on?
·
POST
After replacing a
modular hardware component inside computer case, the updated information about
specific parameters of the new device can be stored in
·
Flash memory, CMOS RAM
After completing the
initial diagnostics and assigning system resources, the startup BIOS program
checks for information about secondary storage devices that might contain the
OS. The list of devices and the order in which they should be checked can be
found and arranged in the CMOS setup utility, and this option is commonly
referred to as:
·
Boot Sequence
In order to work, an
integrated component such as Network Interface Card (NIC) on a newly assembled
computer system may need to be first:
·
Enabled in the
advanced BIOS settings menu
After launching
Windows Virtual PC application technician receives error message stating that
the Hardware-Assisted Virtualization (HAV) feature is not enabled on the
computer. Which of the following steps might help in fixing this problem?
·
Getting into the CMOS
setup utility and enabling the virtualization technology setting
The CMOS setup utility
can be accessed by pressing:
·
The key set by the
motherboard manufacturer for accessing CMOS setup utility during boot
CMOS settings can be
set to factory defaults by: (Select all that apply)
·
Using a jumper that
can be found on the motherboard, Reseating the CMOS battery on the motherboard,
Choosing the default configuration option in the CMOS setup utility
Which of the following
answers refers to a firmware interface designed as a replacement for BIOS?
·
UEFI
What kind of user permission
restrictions can be set in BIOS? (Select all that apply)
·
User password required
to proceed when the computer is powered on, Password-restricted access to the
BIOS setup utility (Supervisor password)
Which of the following
statements is true?
·
Aborted BIOS update
could render the computer unusable
Which type of password
provides the highest level of permissions in BIOS?
·
Supervisor
What is LoJack?
·
Security feature used
for locating stolen desktops, laptops, or tablets
Which of the following
terms refers to a technology that allows for storing passwords, certificates,
or encryption keys in a hardware chip?
·
Trusted Platform
Module (TPM)
While trying to enable
the entire drive encryption feature in Windows technician receives the
following error message: "A compatible Trusted Platform Module (TPM)
Security Device must be present on this computer, but a TPM was not
found". Knowing that the system has a TPM chip installed, which of the
following steps might help in solving this problem?
·
Enabling the TPM
security feature in CMOS setup menu
Which of the answers
listed below describe(s) the features of UEFI? (Select all that apply)
·
DRM Support, GUI mode,
Mouse support, Secure boot, Network access
A computer supporting
LoJack technology has two main components installed: an Application Agent
residing in the operating system which sends tracking signals to the monitoring
center allowing the law enforcement to locate and recover stolen device, and
Persistence Module which restores the Application Agent and allows it to
survive operating system re-installation or hard drive format. The highest
level of security offered by LoJack can be achieved when Persistence Module
resides in:
·
Computer's BIOS
A UEFI functionality
designed to prevent the loading of malware and unauthorized OSs during system
start-up is known as:
·
Secure Boot