medium
Single Answer
0Fotis is concerned about the possibility that hackers may be able to use the Van Eck radiation phenomenon to remotely read the contents of computer monitors in a restricted work area within his facility. What technology would protect against this type of attack?
Answer Options
A
TCSEC
B
SCSI
C
GHOST
D
TEMPEST
Correct Answer: D
Explanation
The TEMPEST program creates technology that is not susceptible to Van Eck phreaking attacks because it reduces or suppresses natural electromagnetic emanations.