What type of attack would alter a configuration file after the system looked to see if it had that specific file?
A.
Covert channel
B.
Backdoor
C.
Fraggle
D.
TOC/TOU
Explanation:
Time-of-check versus time-of-use (TOC/TOU) attacks take advantage of timing differences between when a system checks for files and when it actually executes the files. It is an asynchronous attack.