GK Question

technology hard mcq

Which attack exploits race conditions in software to gain unauthorized privileges?

  1. Buffer Overflow
  2. Time-of-Check-Time-of-Use
  3. SQL Injection
  4. Cross-Site Scripting

Answer: Time-of-Check-Time-of-Use

TOCTOU attacks exploit window between permission check and resource use, allowing privilege escalation or data corruption. Mitigation: atomic operations, locking, and careful design. Critical for secure coding and system security questions.

Topic Ethical Hacking
Exam Relevance Banking, UPSC, SSC