On what resource does a DMA attack focus?

A. CPU
B. NIC
C. memory
D. hard drive

B
Explanation: A risk exists if untrustworthy devices are attached to the bus and initiate a DMA attack. These attacks use the Direct Memory Access function to access the memory on a device to get cryptographic keys that may be there.

Computer Science & Information Technology

You might also like to view...

Strictly speaking, plagiarism is not illegal

Indicate whether the statement is true or false

Computer Science & Information Technology

The process of creating a macro while clicking commands on the ribbon and pressing keys on the keyboard is called ________ a macro

A) editing B) scripting C) tracking D) recording

Computer Science & Information Technology