PrepAway - Latest Free Exam Questions & Answers

The logical exposure associated with the use of a checkpoint restart procedure is:

The logical exposure associated with the use of a checkpoint restart procedure is:

PrepAway - Latest Free Exam Questions & Answers

A.
denial of service.

B.
an asynchronous attack.

C.
wire tapping.

D.
computer shutdown.

Explanation:
Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that
stops a program at specified intermediate points for later restart in an orderly manner without
losing data at the checkpoint. The operating system savesa copy of the computer programs and data
in their current state as well as several system parameters describing the mode and security level of
the program at the time of stoppage. An asynchronous attack occurs when an individual with access
to this information is able to gain access to the checkpoint restart copy of the system parameters
and change those parameters such that upon restart the program would function at a higher-priority
security level.


Leave a Reply