medium
Single Answer
0

Fotis is concerned about the possibility that hackers may be able to use the Van Eck radiation phenomenon to remotely read the contents of computer monitors in a restricted work area within his facility. What technology would protect against this type of attack?

Answer Options

A

TCSEC

B

SCSI

C

GHOST

D

TEMPEST

Correct Answer: D

Explanation

The TEMPEST program creates technology that is not susceptible to Van Eck phreaking attacks because it reduces or suppresses natural electromagnetic emanations.