PrepAway - Latest Free Exam Questions & Answers

The logical exposure associated with the use of a check…

The logical exposure associated with the use of a checkpoint restart procedure is:

PrepAway - Latest Free Exam Questions & Answers

A.
denial of service.

B.
an asynchronous attack.

C.
wire tapping.

D.
computer shutdown.

Explanation:
Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that
stops a program at specified intermediate points for later restart in an orderly manner without losing
data at the checkpoint. The operating system savesa copy of the computer programs and data in
their current state as well as several system parameters describing the mode and security level of
the program at the time of stoppage. An asynchronous attack occurs when an individual with
access to this information is able to gain access to the checkpoint restart copy of the system
parameters and change those parameters such that upon restart the program would function at a
higher-priority security level.


Leave a Reply