Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?
Suggested Answer:C🗳️
Process redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results. It prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data.
Process redundancy involves running multiple instances of the same process, often on different systems. This provides protection against an attacker compromising a single machine, as the redundant processes on other systems would still be intact.
Data redundancy (option A) primarily protects against data loss or corruption, but doesn't inherently prevent unauthorized software insertion or data alteration on a compromised machine.
Hardware redundancy (option B) provides backup hardware components, but doesn't directly address software-based attacks or data alteration.
Application redundancy (option D) is similar to process redundancy, but the question specifically mentions process redundancy as an option.
Therefore, process redundancy (C) is the best answer, as running redundant processes on separate systems provides protection against an attacker compromising and altering data on a single physical machine.
Option B: Hardware Redundancy - should be the answer.
The key is the work "physical" in the question. This type of redundancy can prevent attacks on physical machines because even if an attacker gains physical control of a single machine and inserts unauthorized software in it; the redundant system remains unaffected and secure.
The other options, Data redundancy, Process redundancy and Application redundancy are incorrect because they do not specifically prevent attacks in which an attacker can get physical control of a machine.
- Data redundancy refers to storing duplicate copies of the same data to ensure that it is always accessible but this does not address security issues arising from physical compromise.
- Process redundancy involves having multiple identical processes set up as backups for each other so that if one fails the others can take over; again, this does not provide protection against attacks on physical machines.
- Application Redundancy involves running multiple instances of the same application to ensure high availability and scalability. While this could reduce disruption caused by software failures or scheduled maintenance on applications systems it may have little impact on preventing physical breach induced attack vectors .
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
c4310dc
4 months, 2 weeks ago74gjd_37
1 year, 1 month ago74gjd_37
1 year, 1 month ago4e3rv21rq3vq2q
2 years, 4 months ago