Which of the following types of redundancy prevents attacks in which an attacker can get physical
control of a machine, insert unauthorized software, and alter data?
A.
Data redundancy
B.
Hardware redundancy
C.
Process redundancy
D.
Application redundancy
Explanation:
Process redundancy permits software to run simultaneously on multiple
geographically distributed locations, with voting on results. It prevents attacks in which an attacker
can get physical control of a machine, insert unauthorized software, and alter data.