________, located either by the BIOS or elsewhere on the motherboard, are utilized to bypass protections found in the CMOS

a. Artifacts
b. Key disks
c. Steganographic containers
d. Jumpers

Answer: d

Computer Science & Information Technology

You might also like to view...

What is the default summary statistic for numerical fields in a PivotTable?

A) Average B) SUM C) STDEV D) COUNT

Computer Science & Information Technology

Which registry key tracks individual users and user preferences?

A) HKEY_LOCAL_MACHINE B) HKEY_USERS C) HKEY_CURRENT_USER D) HKEY_CLASSES_ROOT

Computer Science & Information Technology