On what resource does a DMA attack focus?

A. CPU
B. NIC
C. memory
D. hard drive


B
Explanation: A risk exists if untrustworthy devices are attached to the bus and initiate a DMA attack. These attacks use the Direct Memory Access function to access the memory on a device to get cryptographic keys that may be there.

Computer Science & Information Technology

You might also like to view...

The term ________ means criminal activity on the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ is a characteristic of lighting that controls the temperature of a color

A) Brightness B) Saturation C) Tone D) Contrast

Computer Science & Information Technology

Which of the tabs in the accompanying figure allows you to find out the total file-editing time for a project?

A. General B. Summary C. Custom D. Statistics

Computer Science & Information Technology

You are on a service call and receive an urgent phone call. What action should you take?

a. Ask to be excused, and after determining that it is not a truly urgent call, get right back to work while talking on the phone. b. Leave the site and take the call. c. Ask to be excused, and after determining the urgency of the call, go back to work. d. Talk with the person while working.

Computer Science & Information Technology