An attack that changes a symlink on a Linux system between the time that an account's rights to the file are verified and the file is accessed is an example of what type of attack?
A. Unlinking
B. Tick/tock
C. setuid
D. TOCTOU
Answer: D. TOCTOU
Computer Science & Information Technology
You might also like to view...
Which of the following statements is false?
a. A quadrillion-instruction-per-section computer can perform in one second more than 100,000 instructions for every person on the planet. b. Today's key programming methodology is object-oriented programming. c. The vast majority of the microprocessors produced each year are used in general-purpose computers. d. Computers process data under the control of sets of instructions called computer programs..
Computer Science & Information Technology
Choose any four relational algebra operators and explain how each functions.
What will be an ideal response?
Computer Science & Information Technology