The logical exposure associated with the use of a checkpoint restart procedure is: A、denial of service. B、an asynchronous attack. C、wire tapping. D、computer shutdown.