An attack that changes a symlink on a Linux system between the time that an account's rights to the file are verified and the file is accessed is an example of what type of attack?

A. Unlinking
B. Tick/tock
C. setuid
D. TOCTOU


Answer: D. TOCTOU

Computer Science & Information Technology

You might also like to view...

When is the incident reporting function set in motion?

What will be an ideal response?

Computer Science & Information Technology

Outline view displays the text of your slides instead of slide ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not one of the four anomalies that may occur when creating database tables?

A) data redundancy B) update anomaly C) primary anomaly D) insert anomaly E) deletion anomaly

Computer Science & Information Technology

Case 1Alex inherits an existing project from a co-worker.  He familiarizes himself with the contents of the figure shown below. What does the dashed line under the words "World Bead Collection" indicate?

A. hyperlink B. graphic C. error D. bookmark

Computer Science & Information Technology