Which of the following is unlikely to be a technique used to implement a covert storage channel

Question:

Which of the following is unlikely to be a technique used to implement a covert storage channel whereby one process can communicate sensitive information to another unauthorized process?

a. Changing the name of a file in a world-readable directory

b. Changing the workload demands placed upon the central processor

c. Changing the date at which a file was last modified

d. Changing the number of files deleted from a directory

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: