Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
A communication method that allows transferring information in a way that violates the system's security policy is referred to as a _____________.
Backdoors
Timing channels
Trusted path
Covert channel
" a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy" (source: http://en.wikipedia.org/wiki/Covert_channel)
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.