exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 65 discussion

Actual exam question from CompTIA's CS0-002
Question #: 65
Topic #: 1
[All CS0-002 Questions]

A computer hardware manufacturer is developing a new SoC that will be used by mobile devices. The SoC should not allow users or the process to downgrade from a newer firmware to an older one. Which of the following can the hardware manufacturer implement to prevent firmware downgrades?

  • A. Encryption
  • B. eFuse
  • C. Secure Enclave
  • D. Trusted execution
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Merc16
Highly Voted 2 years, 7 months ago
Selected Answer: B
I think B for me the official Comptia cysa guide states Trusted execution—To initialize security functions, the CPU's security extensions invoke a TPM and secure boot attestation to ensure that a trusted operating system is running. while eFUSE eFUSE is an Intel-designed mechanism to allow a software instruction to blow a transistor in the hardware chip. One use of this is to prevent firmware downgrades, implemented on some games consoles and smartphones. Each time the firmware is upgraded, the updater blows an eFUSE. When there is a firmware update, the updater checks that the number of blown eFUSEs is not less than the firmware version number. Another use of eFUSE is one-time programming (OTP), which is used to seal cryptographic keys and other security information during the firmware development process. OTPs can also use a newer technology called antifuse.
upvoted 18 times
2Fish
2 years, 1 month ago
Agree with B, thanks for the detail.
upvoted 3 times
...
...
EVE12
Highly Voted 2 years, 7 months ago
Selected Answer: D
The CySA+ exam outline calls out “trusted firmware updates,” but trusted firmware itself is more commonly described as part of trusted execution environments (TEEs). Trusted firmware is signed by a chip vendor or other trusted party, and then used to access keys to help control access to hardware. TEEs like those used by ARM processors leverage these technologies to protect the hardware by preventing unsigned code from using privileged features.
upvoted 5 times
...
Ayben
Most Recent 1 year, 6 months ago
Selected Answer: D
A System-on-Chip (SoC) implements secure boot or verified boot. It might support a security version number, which prevents downgrading the current firmware to a vulnerable version. Once downgraded to a previous version, an adversary can launch exploits on the SoC and thus compromise the security of the SoC https://cwe.mitre.org/data/definitions/1328.html
upvoted 1 times
...
Dree_Dogg
1 year, 7 months ago
Selected Answer: B
Definitely B
upvoted 2 times
...
nomad421
1 year, 11 months ago
Selected Answer: B
Amazon has blown eFuses on Fire TV devices in the past as a way to seemingly prevent newer devices from taking advantage of older software exploits that allowed the device to be rooted or allowed the bootloader to be unlocked. https://www.aftvnews.com/amazon-blows-efuse-on-fire-tv-stick-to-prevent-downgrading-to-old-interface/
upvoted 2 times
...
LukaszL
1 year, 12 months ago
Selected Answer: B
Agree with comments on B.
upvoted 2 times
...
Stiobhan
2 years, 1 month ago
Selected Answer: B
Answer is B - eFuse. This is an excerpt from the CySA Study Guide 2nd Edition, page 457 "Firmware Security Other defensive technologies can also help to secure systems. IBM's eFuse technology has a number of uses that can help with tuning performance or responding to system degradation, but it also has some interesting security applications. For example, an eFuse can be set at the chip level to monitor firmware levels. This is implemented in the Nintendo Switch, which uses eFuse checking to validate whether the firmware that is being installed is older than the currently installed firmware, preventing downgrading of firmware. When newer firmware is installed, eFuses are “burned,” indicating the new firmware level that is installed".
upvoted 3 times
NerdAlert
2 years ago
this is on page 338 in my book - Sybex CompTIA CySA Study Guide 2nd Edition
upvoted 1 times
...
...
saci_frosty
2 years, 1 month ago
Selected Answer: B
I remember first hearing about eFuse on a lecture about the Xbox 360 security.
upvoted 2 times
NerdAlert
2 years ago
Nintendo Switch uses it too for the firmware purpose mentioned in this question!
upvoted 1 times
...
...
JoInn
2 years, 1 month ago
Selected Answer: D
Intel Trusted Execution Technology (TXT) uses a TPM and cryptographic techniques to measure software and platform components to prevent malfunctioning or compromised components from running. It protects against software-based attacks that would modify the system configuration. So it would prevent firmware downgrades.
upvoted 1 times
...
boletri
2 years, 1 month ago
Selected Answer: B
eFUSE is an Intel-designed mechanism to allow a software instruction to blow a transistor in the hardware chip. One use of this is to prevent firmware downgrades, implemented on some games consoles and smartphones. Each time the firmware is upgraded, the updater blows an eFUSE. When there is a firmware update, the updater checks that the number of blown eFUSEs is not less than the firmware version number. Official Comptia Cysa+ Material
upvoted 1 times
...
ddcnsd65
2 years, 3 months ago
I think the answer is B According to McGraw Hill's Comptia CySA+ All in One study guide page(s) 242 - 243: Another security application of eFuses is to store data. For example you could use them to keep track of the latest version of "FIRMWARE" you have loaded on a device. This could ensure that nobody could revert the firmware to an earlier (presumably less secure) version. If you have enough eFuses in the chip you could store cryptographic keys on it, which could be used to verify the integrity of a "FIRMWARE" upgrade by checking its digital signature before installing it.
upvoted 2 times
...
CyberNoob404
2 years, 3 months ago
Selected Answer: B
100% eFuse
upvoted 3 times
...
R00ted
2 years, 6 months ago
Selected Answer: B
"Other defensive technologies can also help to secure systems. IBM's eFuse technology has a number of uses that can help with tuning performance or responding to system degradation, but it also has some interesting security applications. For example, an eFuse can be set at the chip level to monitor firmware levels. This is implemented in the Nintendo Switch, which uses eFuse checking to validate whether the firmware that is being installed is older than the currently installed firmware, preventing downgrading of firmware. When newer firmware is installed, eFuses are “burned,” indicating the new firmware level that is installed." Comptia study guide book
upvoted 3 times
...
EVE12
2 years, 7 months ago
Selected Answer: B
An eFuse allows for the dynamic real-time reprogramming of computer chips. Utilizing a set of eFuses, a chip manufacturer can allow for the circuits on a chip to change while it is in operation. https://learning.oreilly.com/library/view/comptia-cybersecurity-analyst/9780136747000/ch10.xhtml#ch10lev1sec5
upvoted 1 times
...
Ruby2021
2 years, 7 months ago
The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised.
upvoted 1 times
...
amateurguy
2 years, 7 months ago
Selected Answer: B
B is the only hardware manufacturer implementation i believe.
upvoted 1 times
...
Laudy
2 years, 7 months ago
Selected Answer: B
eFuses are perhaps more commonly used as a one-time programmable ROM. This ranges from writing unique information onto CPUs, or in the case of game consoles and other restricted hardware, preventing downgrades by permanently recording a newer version. https://en.wikipedia.org/wiki/EFuse#:~:text=eFuses%20are%20perhaps%20more%20commonly,permanently%20recording%20a%20newer%20version.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago