PrepAway - Latest Free Exam Questions & Answers

This is an example of this type of attack?

Your audit logs indicate that an employee that you terminated in the morning was still able to access certain sensitive resources on his system, on your internal network, that afternoon. The logs indicate that the employee had logged on successfully before he was terminated but there is no record of him logging off before he was terminated. This is an example of this type of attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Time of Check/Time of Use (TOC/TOU)

B.
Logic Bomb

C.
Remote-access trojans (RATS)

D.
Phishing

Explanation:
A: TOC/TOU is a common type of attack that occurs when some control changes between the time that the system security functions check the contents of variables and the time the variables actually are used during operations. For instance, a user logs on to a system in the morning and later is fired. As a result of the termination, the security administrator removes the user from the user database. Because the user did not log off , he or she still has access to the system and might try to get even. Logic bombs are software modules set up to run in a quiescent state, but to monitor for a specific condition or set of conditions and to activate their payload under those conditions. Remote-access trojans are malicious programs designed to be installed, usually remotely, after systems are installed and working. Phishing attempts to get the user to provide information that will be useful for identity theft-type frauds. Pages 178179.

One Comment on “This is an example of this type of attack?

  1. Joe says:

    TOC/TOU is a common type of attack that occurs when some control changes between the time that the system security functions check the contents of variables and the time the variables actually are used during operations.




    0



    0

Leave a Reply