________, located either by the BIOS or elsewhere on the motherboard, are utilized to bypass protections found in the CMOS
a. Artifacts
b. Key disks
c. Steganographic containers
d. Jumpers
Answer: d
Computer Science & Information Technology
You might also like to view...
What is the default summary statistic for numerical fields in a PivotTable?
A) Average B) SUM C) STDEV D) COUNT
Computer Science & Information Technology
Which registry key tracks individual users and user preferences?
A) HKEY_LOCAL_MACHINE B) HKEY_USERS C) HKEY_CURRENT_USER D) HKEY_CLASSES_ROOT
Computer Science & Information Technology