Are you studying for the CEH certification?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

Upgrade Account

Legitimate, non-malicious programs use overt channels to communicate within computer systems. Trojans often use covert channels to penetrate and attack target machines and networks. Which of the following options is not an example of covert channel use?

An attacker uses ICMP tunneling to mask their exploit

A man-in-the-middle attack is executed in network transmissions from an employee's client machine

An employee visits a phishing website, and is socially engineered to share their online banking credentials

An attacker deploys a reverse WWW shell to sneak into a target network via TCP/IP ports 80 or 443

Explanation

Trojans

Video Training

Train with Skillset and pass your certification exam. Faster. Guaranteed.

Directory

Skillset helps you pass your certification exam.

Contributions and Interactions
Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

Contributions and Interactions
Personalized Training

Create a tailored training plan based on the knowledge you already possess.

Training Video Selector
Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account