SlideShare a Scribd company logo
1 of 1
Download to read offline
Ted considers himself a skillful hacker. He has devised a way to replace the existing startup
programs between the moment that the system boots yet before the system actually executes
these programs. He believes that if he can perfect his attack, he can gain control of the system.
What type of attack is described here?
A. Synchronous attack
B. TOC/TOU attack
C. DCOM attack
D. Smurf attack
Solution
B. A TOC/TOU attack can occur when the contents of a file have changed between the time the
system security functions checked the contents of the variables, and the time the variables are
actually used or accessed. This is a form of asynchronous attack. Answer A is incorrect because
the description describes an asynchronous attack. Answer C is incorrect because the example
does not describe a DCOM attack. Answer D is incorrect because although the network might be
vulnerable to a Smurf attack, the subsequent lock would not change status of such an attack.

More Related Content

Similar to Ted considers himself a skillful hacker. He has devised a way to rep.pdf

USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
Aditya K Sood
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
Mandy Cross
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environment
UltraUploader
 
A technique for removing an important class of trojan horses from high order ...
A technique for removing an important class of trojan horses from high order ...A technique for removing an important class of trojan horses from high order ...
A technique for removing an important class of trojan horses from high order ...
UltraUploader
 

Similar to Ted considers himself a skillful hacker. He has devised a way to rep.pdf (20)

Cyber kill chain.docx
Cyber kill chain.docxCyber kill chain.docx
Cyber kill chain.docx
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Ns
NsNs
Ns
 
PPT_Compiled
PPT_CompiledPPT_Compiled
PPT_Compiled
 
IRJET - Buffer Overflows Attacks & Defense
IRJET -  	  Buffer Overflows Attacks & DefenseIRJET -  	  Buffer Overflows Attacks & Defense
IRJET - Buffer Overflows Attacks & Defense
 
Backtracking king05
Backtracking king05Backtracking king05
Backtracking king05
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
A Review Of Network Security Metrics
A Review Of Network Security MetricsA Review Of Network Security Metrics
A Review Of Network Security Metrics
 
Different type of attack on computer
Different type of attack on computerDifferent type of attack on computer
Different type of attack on computer
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Designing Secure Systems Using AORDD Methodologies in UML System Models
Designing Secure Systems Using AORDD Methodologies in UML  System ModelsDesigning Secure Systems Using AORDD Methodologies in UML  System Models
Designing Secure Systems Using AORDD Methodologies in UML System Models
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets with
 
A worst case worm
A worst case wormA worst case worm
A worst case worm
 
Program security
Program securityProgram security
Program security
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environment
 
A technique for removing an important class of trojan horses from high order ...
A technique for removing an important class of trojan horses from high order ...A technique for removing an important class of trojan horses from high order ...
A technique for removing an important class of trojan horses from high order ...
 
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
 

More from alokkesh

LinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
LinearPerson.javaPlease help me the JAVA programPlease provide t.pdfLinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
LinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
alokkesh
 
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdfFlag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
alokkesh
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Fill in the blanksMicronutrients this refers to a sub-category o.pdf
Fill in the blanksMicronutrients this refers to a sub-category o.pdfFill in the blanksMicronutrients this refers to a sub-category o.pdf
Fill in the blanksMicronutrients this refers to a sub-category o.pdf
alokkesh
 
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdfecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
alokkesh
 
DiARTHROIDAL joints can be classified based on their characteristics.pdf
DiARTHROIDAL joints can be classified based on their characteristics.pdfDiARTHROIDAL joints can be classified based on their characteristics.pdf
DiARTHROIDAL joints can be classified based on their characteristics.pdf
alokkesh
 
Cite the distinction between graphite and carbon. Carbon and graphit.pdf
Cite the distinction between graphite and carbon.  Carbon and graphit.pdfCite the distinction between graphite and carbon.  Carbon and graphit.pdf
Cite the distinction between graphite and carbon. Carbon and graphit.pdf
alokkesh
 

More from alokkesh (20)

most extra cellular environments contain a high concentration of sod.pdf
most extra cellular environments contain a high concentration of sod.pdfmost extra cellular environments contain a high concentration of sod.pdf
most extra cellular environments contain a high concentration of sod.pdf
 
Let X be the prive of a meal at a local diner( X = $8,$10,and $12) a.pdf
Let X be the prive of a meal at a local diner( X = $8,$10,and $12) a.pdfLet X be the prive of a meal at a local diner( X = $8,$10,and $12) a.pdf
Let X be the prive of a meal at a local diner( X = $8,$10,and $12) a.pdf
 
LinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
LinearPerson.javaPlease help me the JAVA programPlease provide t.pdfLinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
LinearPerson.javaPlease help me the JAVA programPlease provide t.pdf
 
is acute or chronic exposure to heptachlor more of a danger to human.pdf
is acute or chronic exposure to heptachlor more of a danger to human.pdfis acute or chronic exposure to heptachlor more of a danger to human.pdf
is acute or chronic exposure to heptachlor more of a danger to human.pdf
 
In “Intellectual Property and the Information Age,” Richard T. De Ge.pdf
In “Intellectual Property and the Information Age,” Richard T. De Ge.pdfIn “Intellectual Property and the Information Age,” Richard T. De Ge.pdf
In “Intellectual Property and the Information Age,” Richard T. De Ge.pdf
 
How does horizontal transfer affect the evolution of anti-biotic res.pdf
How does horizontal transfer affect the evolution of anti-biotic res.pdfHow does horizontal transfer affect the evolution of anti-biotic res.pdf
How does horizontal transfer affect the evolution of anti-biotic res.pdf
 
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdfFlag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
Flag this QuestionQuestion 12 1 ptsPolytene chromosomes arise fr.pdf
 
Genetic drift tends to genetic variation wITHIN small populations, an.pdf
Genetic drift tends to genetic variation wITHIN small populations, an.pdfGenetic drift tends to genetic variation wITHIN small populations, an.pdf
Genetic drift tends to genetic variation wITHIN small populations, an.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Fill in the blanksMicronutrients this refers to a sub-category o.pdf
Fill in the blanksMicronutrients this refers to a sub-category o.pdfFill in the blanksMicronutrients this refers to a sub-category o.pdf
Fill in the blanksMicronutrients this refers to a sub-category o.pdf
 
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdfecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
ecourses.pvamu.edu Help English United States en us) Question4 Ma.pdf
 
Explain why several versions of nMOS transistor models and pMOS trans.pdf
Explain why several versions of nMOS transistor models and pMOS trans.pdfExplain why several versions of nMOS transistor models and pMOS trans.pdf
Explain why several versions of nMOS transistor models and pMOS trans.pdf
 
Explain How Culture influences the way mangers perform their four ma.pdf
Explain How Culture influences the way mangers perform their four ma.pdfExplain How Culture influences the way mangers perform their four ma.pdf
Explain How Culture influences the way mangers perform their four ma.pdf
 
Describeillustrate the construction used by the ancient Indians to s.pdf
Describeillustrate the construction used by the ancient Indians to s.pdfDescribeillustrate the construction used by the ancient Indians to s.pdf
Describeillustrate the construction used by the ancient Indians to s.pdf
 
Describe the factors that contribute to a membrane potential. What i.pdf
Describe the factors that contribute to a membrane potential. What i.pdfDescribe the factors that contribute to a membrane potential. What i.pdf
Describe the factors that contribute to a membrane potential. What i.pdf
 
DiARTHROIDAL joints can be classified based on their characteristics.pdf
DiARTHROIDAL joints can be classified based on their characteristics.pdfDiARTHROIDAL joints can be classified based on their characteristics.pdf
DiARTHROIDAL joints can be classified based on their characteristics.pdf
 
Define and explain chemical equilibrium Include the defenition o.pdf
Define and explain chemical equilibrium Include the defenition o.pdfDefine and explain chemical equilibrium Include the defenition o.pdf
Define and explain chemical equilibrium Include the defenition o.pdf
 
Cite the distinction between graphite and carbon. Carbon and graphit.pdf
Cite the distinction between graphite and carbon.  Carbon and graphit.pdfCite the distinction between graphite and carbon.  Carbon and graphit.pdf
Cite the distinction between graphite and carbon. Carbon and graphit.pdf
 
C Language ProblemPlease Explain If int n1 = 5, and int d1 = 2, wh.pdf
C Language ProblemPlease Explain If int n1 = 5, and int d1 = 2, wh.pdfC Language ProblemPlease Explain If int n1 = 5, and int d1 = 2, wh.pdf
C Language ProblemPlease Explain If int n1 = 5, and int d1 = 2, wh.pdf
 
According to Cisco design theory for a fully switched network, hosts.pdf
According to Cisco design theory for a fully switched network, hosts.pdfAccording to Cisco design theory for a fully switched network, hosts.pdf
According to Cisco design theory for a fully switched network, hosts.pdf
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

Ted considers himself a skillful hacker. He has devised a way to rep.pdf

  • 1. Ted considers himself a skillful hacker. He has devised a way to replace the existing startup programs between the moment that the system boots yet before the system actually executes these programs. He believes that if he can perfect his attack, he can gain control of the system. What type of attack is described here? A. Synchronous attack B. TOC/TOU attack C. DCOM attack D. Smurf attack Solution B. A TOC/TOU attack can occur when the contents of a file have changed between the time the system security functions checked the contents of the variables, and the time the variables are actually used or accessed. This is a form of asynchronous attack. Answer A is incorrect because the description describes an asynchronous attack. Answer C is incorrect because the example does not describe a DCOM attack. Answer D is incorrect because although the network might be vulnerable to a Smurf attack, the subsequent lock would not change status of such an attack.