Question 15:
Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?
Answer options:
A. Data redundancy B. Hardware redundancy C. Process redundancy D. Application redundancy