The CMOS setup utility can be accessed by pressing
The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system.
Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select 2 answers)
In modern PCs, the procedure of replacing BIOS contents is sometimes referred to as:
· Flashing the BIOS
BIOS updates are performed in order to: (Select all that apply)
-Repair damaged BIOS
-Provide support for new types of attached hardware
-Fix known programming errors discovered in the current BIOS version
Which of the following terms refer to BIOS types that can be updated without removing the BIOS chip from a motherboard? (Select 2 answers)
Which Microsoft Windows OS utility can be used to view basic information about computer's BIOS?
Power failure during BIOS upgrade can be the cause of irreversible damage to the computer system.
After a normal system shutdown, when the computer is turned off, contents of the memory used to store BIOS settings are:
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the computer is powered on?
After replacing a modular hardware component inside computer case, the updated information about specific parameters of the new device can be stored in: (Select 2 answers)
After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly referred to as:
· Boot sequence
In order to work, an integrated component such as Network Interface Card (NIC) on a newly assembled computer system may need to be first:
· Enabled in the advanced BIOS settings menu
After launching Windows Virtual PC application technician receives error message stating that the Hardware-Assisted Virtualization (HAV) feature is not enabled on the computer. Which of the following steps might help in fixing this problem?
· Getting into the CMOS setup utility and enabling the virtualization technology setting.
The CMOS setup utility can be accessed by pressing:
· The key set by the motherboard manufacturer for accessing CMOS setup utility during boot.
CMOS settings can be set to factory defaults by: (Select all that apply)
-Using a jumper that
can be found on the motherboard.
-Reseating the CMOS battery on the motherboard.
-Choosing the default configuration option in the CMOS setup utility.
Which of the following answers refers to a firmware interface designed as a replacement for BIOS?
What kind of user permission restrictions can be set in BIOS? (Select all that apply)
required to proceed when the computer is powered on.
-Password-restricted access to the BIOS setup utility(Supervisor password).
Which of the following statements is true?
· Aborted BIOS update could render the computer unusable.
Which type of password provides the highest level of permissions in BIOS?
What is LoJack?
· Security feature used for locating stolen desktops, laptops, or tablets.
Which of the following terms refers to a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip?
· Trusted Platform Module(TPM).
While trying to enable the entire drive encryption feature in Windows technician receives the following error message: "A compatible Trusted Platform Module (TPM) Security Device must be present on this computer, but a TPM was not found". Knowing that the system has a TPM chip installed, which of the following steps might help in solving this problem?
· Enabling the TPM security feature in CMOS setup menu.
Which of the answers listed below describe(s) the features of UEFI? (Select all that apply)
A computer supporting LoJack technology has two main components installed: an Application Agent residing in the operating system which sends tracking signals to the monitoring center allowing the law enforcement to locate and recover stolen device, and Persistence Module which restores the Application Agent and allows it to survive operating system re-installation or hard drive format. The highest level of security offered by LoJack can be achieved when Persistence Module resides in:
· Computer's BIOS.
A UEFI functionality designed to prevent the loading of malware and unauthorized OSs during system start-up is known as:
· Secure boot