Question
Gwen wants to leverage her system’s built-in secure boot process to report to her central security systems about the security of the system as it boots. What technology can she use?
Group of answer choices
Bootlogs
Boot hashing
Measured boot
Secure boot
Group of answer choices
Bootlogs
Boot hashing
Measured boot
Secure boot
Answers
GPT-4o mini
Gwen can use **Measured Boot** to leverage her system’s built-in secure boot process to report to her central security systems about the security of the system as it boots.
Measured Boot records cryptographic hashes of each component that is loaded during the boot process, allowing for verification of the integrity of the boot sequence. This technology helps in establishing a trust chain from the hardware up to the operating system, enabling reporting of the security status.
Measured Boot records cryptographic hashes of each component that is loaded during the boot process, allowing for verification of the integrity of the boot sequence. This technology helps in establishing a trust chain from the hardware up to the operating system, enabling reporting of the security status.