Exam CSSLP All QuestionsBrowse all questions from this exam
Question 15

Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?

    Correct Answer: B

    Hardware redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data. When hardware redundancy is in place, there are additional hardware components such as servers, CPUs, or storage devices that act as backups. Even if an attacker compromises one machine physically, the redundant hardware ensures the system can continue to operate securely, thus minimizing the risk from physical tampering or unauthorized software insertion.

Discussion
74gjd_37Option: B

Option B: Hardware Redundancy - should be the answer. The key is the work "physical" in the question. This type of redundancy can prevent attacks on physical machines because even if an attacker gains physical control of a single machine and inserts unauthorized software in it; the redundant system remains unaffected and secure.

74gjd_37

The other options, Data redundancy, Process redundancy and Application redundancy are incorrect because they do not specifically prevent attacks in which an attacker can get physical control of a machine. - Data redundancy refers to storing duplicate copies of the same data to ensure that it is always accessible but this does not address security issues arising from physical compromise. - Process redundancy involves having multiple identical processes set up as backups for each other so that if one fails the others can take over; again, this does not provide protection against attacks on physical machines. - Application Redundancy involves running multiple instances of the same application to ensure high availability and scalability. While this could reduce disruption caused by software failures or scheduled maintenance on applications systems it may have little impact on preventing physical breach induced attack vectors .

c4310dcOption: C

Process redundancy involves running multiple instances of the same process, often on different systems. This provides protection against an attacker compromising a single machine, as the redundant processes on other systems would still be intact. Data redundancy (option A) primarily protects against data loss or corruption, but doesn't inherently prevent unauthorized software insertion or data alteration on a compromised machine. Hardware redundancy (option B) provides backup hardware components, but doesn't directly address software-based attacks or data alteration. Application redundancy (option D) is similar to process redundancy, but the question specifically mentions process redundancy as an option. Therefore, process redundancy (C) is the best answer, as running redundant processes on separate systems provides protection against an attacker compromising and altering data on a single physical machine.

4e3rv21rq3vq2qOption: C

C. Process redundancy