A research facility requires a hardware-based approach that restores a stable configuration if critical system code becomes corrupted. Which method best satisfies this objective?
A remote console that applies new code from a shared database at designated intervals
A hardware module that can load verified operational instructions whenever code integrity fails
A centralized update platform that distributes replacement code after a security review
An on-demand service that scans components and creates alerts for manual investigation
A dedicated mechanism that maintains a valid set of operational instructions and enables the system to recover without human involvement addresses the need for swift restoration. Reliance on external networks, scheduled checks, or separate repositories does not provide the same autonomous fallback, as they introduce delays and depend on outside intervention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the hardware module mentioned in the correct answer?
Open an interactive chat with Bash
How does verified code integrity work in these hardware modules?
Open an interactive chat with Bash
Why are external networks or manual processes less reliable for this scenario?