On what resource does a DMA attack focus?
A. CPU
B. NIC
C. memory
D. hard drive
B
Explanation: A risk exists if untrustworthy devices are attached to the bus and initiate a DMA attack. These attacks use the Direct Memory Access function to access the memory on a device to get cryptographic keys that may be there.
Computer Science & Information Technology
You might also like to view...
Strictly speaking, plagiarism is not illegal
Indicate whether the statement is true or false
Computer Science & Information Technology
The process of creating a macro while clicking commands on the ribbon and pressing keys on the keyboard is called ________ a macro
A) editing B) scripting C) tracking D) recording
Computer Science & Information Technology