ISC Exam Questions

What type of attack would alter a configuration file after the system looked to see if it had that s

What type of attack would alter a configuration file after the system looked to see if it had that specific file?

A.
Covert channel

B.
Backdoor

C.
Fraggle

D.
TOC/TOU

Explanation:
Time-of-check versus time-of-use (TOC/TOU) attacks take advantage of timing differences between when a system checks for files and when it actually executes the files. It is an asynchronous attack.