Trusted Computing Interview Questions & Answers

This blog list out interview questions and answers of Trusted Computing.

Q. What is Trusted Computing?

Ans: Combination of components and mechanisms that complied with the Trusted Computing Group (TCG).

Q. Why is Trusted Computing required by most companies?

Ans:

  • To interact with remote servers securely for sharing financial records, e-commerce, medical records, etc.
  • To verify the integrity of the remote user
  • Communicate integrity information of host to a remote user securely
  • Determine the level of trust

Q. What is TPM?

Ans: TPM, short for Trusted Platfrom Module, is a trusted platform that has trusted component in a form of usually builtin hardware. Remember, if trusted component fails, it will break the whole security of the system.

TPM provide mainly three functionalities that includes secure storage, platfrom integrity reporting and platform authentication.

Remember, to check integrity, hashes are used and these hashes are stored in TPM.

In PC, TPM are embedded in motherboard of system.

Q. List out developers of TPM.

Ans: Intel, Lenovo, IBM, Broadcom, Atmel, HP etc. are some of the developers of TPM.

Q. What is difference between Secure Boot and Trusted Boot?

Ans: The major difference between is not to allow boot of OS on compromise in case of secure boot while allow boot of OS on compromise in case of trusted boot if user permits. In simple words, your system keeps on running if secure boot guarantee is violated for trusted boot.

When system updates, hash of OS will change. In case of secure boot, OS will not boot if boot guarantee is violated. While in case of trusted boot, OS will boot if user provide consent for changes performed.

Q. What are the differences between Static Root of Trust Management (SRTM), and Dynamic Root of Trust Management (DRTM)?

Ans:

SRTMDRTM
Static root of trust provides a way to calculate hash of all possible code and its hash stored in PCR.DRTM solves the problem and here chain of trust that starts after the OS has booted in non-secure mode. 

Q. What is Root of Trust?

Ans: Root of trust is used to verify integrity of devices. Here, Chain of trust is dened as a chain of operations that is used for a measured boot.

Q. What is GRUB?

Ans: GRUB, stands for GRand Unified Bootloader. It helps the system for dual boot of different operating system.

Q. What is VPN technology?

Ans: VPN, short for Virtual Private Network, used to connect remote system securely by creating secure tunnel.

Q. What is Platform Configuration Register (PCR)?

Ans: PCR supports unlimited number of integrity measurement of executables.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published.