Which feature ensures only signed bootloaders and kernels run to protect against rootkits?

Prepare for the Google Data Center Technician Exam. Use our interactive quiz featuring flashcards and multiple choice questions with hints and explanations. Get exam-ready today!

Multiple Choice

Which feature ensures only signed bootloaders and kernels run to protect against rootkits?

Explanation:
Establishing a trusted boot path by verifying signatures. UEFI Secure Boot uses digital signatures and a PKI in the firmware to validate each component in the boot sequence—bootloaders and kernels—before they are allowed to run. The firmware holds trusted keys, and boot components must be signed by those keys. If a signature matches, boot proceeds; if not, the boot is halted. This prevents rootkits from loading during startup because unsigned or tampered code cannot pass the checks. Other options don’t provide this boot-time verification: NVRAM Boot ROM is just storage for firmware, PCIe Slot is a hardware interface, and the BMC handles out-of-band management rather than enforcing signed boot code.

Establishing a trusted boot path by verifying signatures. UEFI Secure Boot uses digital signatures and a PKI in the firmware to validate each component in the boot sequence—bootloaders and kernels—before they are allowed to run. The firmware holds trusted keys, and boot components must be signed by those keys. If a signature matches, boot proceeds; if not, the boot is halted. This prevents rootkits from loading during startup because unsigned or tampered code cannot pass the checks. Other options don’t provide this boot-time verification: NVRAM Boot ROM is just storage for firmware, PCIe Slot is a hardware interface, and the BMC handles out-of-band management rather than enforcing signed boot code.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy