WGU Cybersecurity-Architecture-and-Engineering Question Answer
A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which technique will prevent unauthorized modifications to the BIOS firmware on a server?