Which of the following types of attack makes use of common consumer devices that can be used
to transfer data surreptitiously?
Direct access attacks
Indirect access attacks
None of the choices.
Direct access attacks make use of common consumer devices that can be used to transfer data
surreptitiously. Someone gaining physical access to a computer can install all manner of devices
to compromise security, including operating system modifications, software worms, keyboard
loggers, and covert listening devices. The attacker can also easily download large quantities of
data onto backup media or portable devices.