An organization wants each component of a workstation’s startup logged with cryptographic checks to detect changes to firmware or the kernel before the environment is loaded. Which method gathers cryptographic evidence across the startup sequence so the final state can be validated?
Layered cryptographic checks accumulate hashes of each startup stage and record them in secure memory, providing strong insight into any changes. Other techniques either focus on runtime protection or partial signing, which do not track initial components in a complete progression.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are layered cryptographic checks?
Open an interactive chat with Bash
What is a cryptographic hash?
Open an interactive chat with Bash
Why don't runtime protections or partial signing work for startup integrity?