A channel that transfers information within a computer system or network in a way that violates the security policy
B.
A legitimate communication path within a computer system or network for transfer of data
C.
It is a kernel operation that hides boot processes and services to mask detection
D.
It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
The Answer Is:
A
This question includes an explanation.
Explanation:
Comprehensive and Detailed Explanation:
A covert channel is any communication path that allows data to be transferred in violation of a system’s security policy. It’s commonly used by malware or Trojans to exfiltrate data or send commands undetected.
Examples include:
Encoding data in TCP headers (unused bits)
Timing of packets (timing channel)
Use of legitimate protocols to piggyback malicious traffic
From CEH v13 Courseware:
Module 6: Malware Threats → Trojans and Covert Channels
[Reference:CEH v13 Study Guide – Module 6: Trojan Communication → Covert and Overt ChannelsNIST SP 800-53 – Covert Channel Analysis, ==================================================================, , ]
312-50v13 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"