PrepAway - Latest Free Exam Questions & Answers

The logical exposure associated with the use of a check…

The logical exposure associated with the use of a checkpoint restart procedure is:

PrepAway - Latest Free Exam Questions & Answers

A.
denial of service.

B.
an asynchronous attack.

C.
wire tapping.

D.
computer shutdown.

Explanation:
Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that stops a
program at specified intermediate points for later restart in an orderly manner without losing data at the
checkpoint. The operating system saves a copy of the computer programs and data in their current state as
well as several system parameters describing the mode and security level of the program at the time of
stoppage. An asynchronous attack occurs when an individual with access to this information is able to gain
access to the checkpoint restart copy of the system parameters and change those parameters such that upon
restart the program would function at a higher-priority security level.


Leave a Reply