Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?
Process redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results. It
prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data.
Currently there are no comments in this discussion, be the first to comment!