Register
14:00
Stop
CompTIA Security+ - Risk Management - Security Governance
Intermediate
1/14
A company is experiencing frequent secure boot violations and wants to minimize these occurrences. What step should be performed during the deployment of new systems?
a.
Configure the BIOS to ignore the Secure Boot Violation
b.
Deploy systems without a Trusted Platform Module (TPM)
c.
Disable Secure Boot on the systems
d.
Ensure that newly deployed systems have signed bootloader code
Intermediate