Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Legitimate, non-malicious programs use overt channels to communicate within computer systems. Trojans often use covert channels to penetrate and attack target machines and networks. Which of the following options is not an example of covert channel use?
An attacker uses ICMP tunneling to mask their exploit
A man-in-the-middle attack is executed in network transmissions from an employee's client machine
An employee visits a phishing website, and is socially engineered to share their online banking credentials
An attacker deploys a reverse WWW shell to sneak into a target network via TCP/IP ports 80 or 443
Using phishing websites are an example of an overt attack, that technique doesn't use covert channels. Covert channel attacks usually add, alter, and sniff data in packets that are generated by authorized users. If social engineering is necessary, that's an overt attack! EDIT2: agreed. I don't see the covert channel used in this attack.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.