Are you studying for the CEH or CISSP certifications?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

Upgrade Account

Which of following responses correspond to an example of covert channel attack ?

TOCTOU - Time of Check to Time of Use is a covert channel attack that is based on the time gap that may occur between check and effective usage of the result of that check.

TOCTOU - This term is a form of timing attack and the term refers to the noise produced by an analog wrist watch.

TOCTOU - This term does not refer to a covert channel attack. Covert channel attacks only refer to conveying messages through communication ports in violation of policy.

TOCTOU - Time of Change to Time of Usage is a covert channel attack that uses change management flaws.

Explanation

Covert Channels

Video Training

Train with Skillset and pass your certification exam. Faster. Guaranteed.

Skillset helps you pass your certification exam.

Contributions and Interactions
Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

Contributions and Interactions
Personalized Training

Create a tailored training plan based on the knowledge you already possess.

Training Video Selector
Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account