A security team notes repeated tampering before the operating system takes control on multiple servers. Which measure best confirms that the earliest code remains secure during initial checks?
Replace the boot partition to remove any threat artifacts
Activate a cryptographic check in the firmware environment
Add a host-based firewall to the server architecture
Restrict overall memory availability before loading the system
A cryptographic check in the firmware environment validates that each piece of code is trusted and has not been altered. Adding a host-based firewall or limiting memory relates to the operating system level, not the earliest startup phases. Simply replacing the boot partition does not guarantee that the initial code remains protected before the OS starts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic check in the firmware environment?
Open an interactive chat with Bash
Why can't a host-based firewall protect the early stages of the boot process?
Open an interactive chat with Bash
What are the risks of not securing the boot process?