Which one of the following techniques can an attacker use to exploit a TOC/TOU vulnerability?

A. File locking
B. Exception handling
C. Algorithmic complexity
D. Concurrency control

Answer: C. Algorithmic complexity

Computer Science & Information Technology

You might also like to view...

The Nigerian Advance Fee Scheme is known internationally as "4-1-9."

Indicate whether the statement is true or false.

Computer Science & Information Technology

A ________ is a private network that is configured within a public network to take advantage of the economies of scale and management facilities of large networks.

A) MAN B) VPN C) VTN D) WAN

Computer Science & Information Technology