The logical exposure associated with the use of a checkpoint restart procedure is:

The logical exposure associated with the use of a checkpoint restart procedure is:

The logical exposure associated with the use of a checkpoint restart procedure is:

A.
denial of service.

B.
an asynchronous attack.

C.
wire tapping.

D.
computer shutdown.

Explanation:
Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that stops a program at specified intermediate points for later restart in an orderly manner without losing data at the checkpoint. The operating system savesa copy of the computer programs and data in their current state as well as several system parameters describing the mode and security level of the program at the time of stoppage. An asynchronous attack occurs when an individual with access to this information is able to gain access to the checkpoint restart copy of the system parameters and change those parameters such that upon restart the program would function at a higher-priority security level.



Leave a Reply 0

Your email address will not be published. Required fields are marked *