CompTIA Security+ Exam Prep

Category - Engineering

Jeremy wants to sneak unauthorized information in an unauthorized manner. How would he do that?
  1. Channel Decipher
  2. Covert Channels
  3. Storage Convert
  4. Decipher Storage
Explanation
Answer: B - To gain information in an unauthorized manner, one would use covert channels. It is an information flow that is not controlled by a security mechanism. This type of information path was not developed for communication; thus, the system does not properly protect this path because the developers never envisioned information being passed in this way. The channel to transfer unauthorized data is a result of one of the following conditions: improper oversight in the development of the product, improper implementation of access controls within the software, or existence of a shred resource between the two entities. There are two types of covert channels: storage and timing.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz