One way to defeat a multi-level security solution is to leak data via
A. a bypass regulator.
B. steganography.
C. a covert channel.
D. asymmetric routing.
EC-Council Certified Ethical Hacker v11Free dumps for 312-50v11 in Printable PDF format.High quality PDF and software. VALID exam to help you pass. |
why not B?
In theory, steganography can be detected by one of the layers of security. Covert Channels by their definition are able to bypass security layers. (If they couldn’t get past the security then there would not be a Covert Channel).
C
It says it right there Jeme!
Why not B?
steganography.
steganography doesn’t hide the flow of traffic out, or the data volume size. So the size of the data can easily be used to guess what’s being taken out.