单选题
75、Online attacks exploit the fact that sensitive data or encryption keys may be present in the system memory in plaintext when an encrypted volume is mounted.Although super user privileges may be required for launching such attacks, we choose not to trust the administrator account.A general key scavenging attack attempts to intelligently run through the system memory ( ) trying to locate and read encryption keys.Any system that requires the communication of key material between kernel-space and user-space components is vulnerable to a general user-space attack, wherein the attacker tries to capture the key when it is present in the address space of an exploitable user-space process.Daemon masquerading is another online attack on schemes that employ a trusted user-space process for key management.An attacker can replace the trusted daemon with a malicious program or launch a man-in-the middle attack on the kernel-space and user-space channel to gain access to encryption keys.In the page cache attack, an attacker may insert and load a malicious kernel module from the user-space at run-time to traverse the page cache and access file contents.Attacks that require super user privileges may be classified.as hard or easy depending on the level of sophistication and effort required to execute them.Although accessing or modifying specific kernel-space data structures of a running system is difficult even for the administrator, exploiting user space vulnerabilities is clearly easy.In a typical compromise, an attacker may gain super user privileges for a short duration and trivially undertake the above attacks.A distinction between the kernel and user-space from a security perspective is becoming crucial as temporary root attacks become common.(3)、How many methods of online attacks have been mentioned in this paragraph?
A
1
B
2
C
3
D
4
答案解析
正确答案:C
相关题目
单选题
233、catch up on是赶上
单选题
232、decide on是决定
单选题
231、I wouldn't recommend reading in this light; it may affect your eyes
单选题
230、Don't give anyone online your real last (), phone number, or your home address
单选题
229、Most of the problems () on the major online services
单选题
228、She and I would never () openly exchanged such words of affection
单选题
227、If a computer message came addressed to”Dad”, for (), I'd feel forgotten and neglected.
单选题
226、To her surprise.she found () the letter came undated
单选题
225、The medicine needs to be taken () a daily basis
单选题
224、over the years
