Which of the following is unlikely to be a technique used to implement a covert storage channel
Question:
Which of the following is unlikely to be a technique used to implement a covert storage channel whereby one process can communicate sensitive information to another unauthorized process?
a. Changing the name of a file in a world-readable directory
b. Changing the workload demands placed upon the central processor
c. Changing the date at which a file was last modified
d. Changing the number of files deleted from a directory
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: