Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What communication method can be used by malware and takes advantage of unused TCP/IP header fields to carry traffic to remain hidden from the data system owner or users?
Noninterference
Covert Channel
Overt Communications
Concealed Communications
Covert channel is the correct answer. Noninterference prevents covert channels from occurring by ensuring that different security domains remain separate from each other. Overt is synonymous with known so overt communications are known, not hidden. Covert channels could be described as concealed communications or a hidden channel, but the correct term is covert.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.