Which one of the following techniques can an attacker use to exploit a TOC/TOU vulnerability?
A. File locking
B. Exception handling
C. Algorithmic complexity
D. Concurrency control
Answer: C. Algorithmic complexity
Computer Science & Information Technology
You might also like to view...
The Nigerian Advance Fee Scheme is known internationally as "4-1-9."
Indicate whether the statement is true or false.
Computer Science & Information Technology
A ________ is a private network that is configured within a public network to take advantage of the economies of scale and management facilities of large networks.
A) MAN B) VPN C) VTN D) WAN
Computer Science & Information Technology