Ted considers himself a skillful hacker. He has devised a way to replace the existing startup programs between the moment that the system boots yet before the system actually executes these programs. He believes that if he can perfect his attack, he can gain control of the system. What type of attack is described here? A. Synchronous attack B. TOC/TOU attack C. DCOM attack D. Smurf attack Solution The correct answer is B . TOC/TOU attack ---------------------------------------------------------------------------------- Explanation : This kind of attac is called \"Time of Check/Time of Use (TOCTOU)\" attack. For suppose process X checked that a certain file exists and has certain attributes before opening the file and do some necessary operations on the file. By the time X opens it, the file could have been replaced with another file that was not the same as before that was checked by the process X. If the time gap between TOC and TOU is long can cause TOCTOU type of access to gain access control over the system resoruces and malfunction the system properties. .