which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

Which of the following types of redundancy prevents attacks in which an attacker can get physical
control of a machine, insert unauthorized software, and alter data?

Which of the following types of redundancy prevents attacks in which an attacker can get physical
control of a machine, insert unauthorized software, and alter data?

A.
Data redundancy

B.
Hardware redundancy

C.
Process redundancy

D.
Application redundancy

Explanation:
Process redundancy permits software to run simultaneously on multiple
geographically distributed locations, with voting on results. It prevents attacks in which an attacker
can get physical control of a machine, insert unauthorized software, and alter data.



Leave a Reply 0

Your email address will not be published. Required fields are marked *