Basic Input/Output System, the software used to start the system, BIOS is commonly the system firmware
What is POST?
Power-on Self-Test, is the BIOS checking its own functionality
What distinguishes a legacy BIOS?
Operating systems communicated to the hardware through the BIOS
Define and describe UEFI
Unified Extensible Firmware Interface, a defined standard designed to replace legacy systems by making the BIOS graphical and text-based
What are secret buttons?
The key(s) a user needs to press during startup to access the BIOS
True or False: The only way to experiment with UEFI/BIOS is in system
False - There are simulators available or you can run a virtual machine
What are 3 ways to access the BIOS from the Windows desktop?
Hold shift while pressing restart, settings/update & security/recovery/advanced startup/restart now, msconfig
What is the most important step in changing BIOS configurations?
Making a backup
What are the 2 most important boot options in BIOS?
Device enabling, and boot order
What is a secure boot?
Part of the UEFI specification that cryptographically secures instructions for software and firmware, ensures that malware cannot hijack the system at the BIOS level
True or False: A password can be implemented at the BIOS level to prevent the OS from booting
True
How can a user reset their boot password?
Resetting the BIOS by jumping/shorting the CMOS
Define and describe CMOS
Complementary Metal-Oxide Semiconductor, is a type of memory that sets the system clock and BIOS configuration
True or False: All systems require a CMOS battery
False - Modern systems use Flash memory in CMOS to circumvent the need for dedicated power
What is the consequence of a bad CMOS battery?
The user will need to manually configure their BIOS and Date/Time on each boot
Define and describe TPM
Trusted Platform Module, is a hardware to help with encryption functions, it is persistent memory with cryptographic keys implanted during production, it is password protected
Define and describe HSM
Hardware Security Module, is a high-end cryptographic hardware commonly used in large environments, a higher grade TPM