Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data? A. Data redundancy B. Hardware redundancy C. Process redundancy D. Application redundancy Suggested Answer: C Community Answer: B Process redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results. It prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data. This question is in CSSLP Certified Secure Software Lifecycle Professional Exam For getting Certified Secure Software Lifecycle Professional (CSSLP) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISC. Trademarks, certification & product names are used for reference only and belong to ISC. The website does not contain actual questions and answers from ISC's Certification Exams.
Please login or Register to submit your answer