What type of attack would alter a configuration file after the system looked to see if it had that specific file?

What type of attack would alter a configuration file after the system looked to see if it had that specific file?

What type of attack would alter a configuration file after the system looked to see if it had that specific file?

A.
Covert channel

B.
Backdoor

C.
Fraggle

D.
TOC/TOU

Explanation:
Time-of-check versus time-of-use (TOC/TOU) attacks take advantage of timing differences between when a system checks for files and when it actually executes the files. It is an asynchronous attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *