Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 183 discussion

Actual exam question from ISC's CISSP
Question #: 183
Topic #: 1
[All CISSP Questions]

Which of the following is a covert channel type?

  • A. Pipe
  • B. Memory
  • C. Storage
  • D. Monitoring
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 2 months ago
Storage channels are used by attackers to encode the information getting transferred and then decode it later. In TCP/IP stacks, some fields are left vacant or unused. Attackers utilize these unused fields as storage channels.
upvoted 14 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
[Removed]
Highly Voted 2 years, 2 months ago
Storage. C
upvoted 7 times
...
sbear123
Most Recent 8 months, 1 week ago
Selected Answer: C
Covert Channel types: Timing or Storage
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
In the context of computer security, covert channels typically refer to timing and storage covert channels. So, the correct answer is: C. Storage
upvoted 1 times
...
isaac592
1 year, 1 month ago
Selected Answer: C
Two types of covert channels: covert storage and covert timing. • A covert storage channel is used when one process writes data to a hard drive and another process reads it. In a covert storage attack, a higher-level subject writes data to a storage area and a lower subject reads it. In a covert storage channel, security risks arise due to the storage location. • A covert timing channel is used when a process transmits data to another process. Covert timing channels convey information by modifying the timing of a system resource in some measurable way.
upvoted 4 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
According to the official study guide, there are only two types of covert channels: timing and storage. Since the question is about a covert channel TYPE, the only valid response is "storage" (C). All other options are not a covert channel types and thus are incorrect. While a pipe can be used as a communication mechanism between processes, it is not a covert channel type in the context of computer security. Therefore, the only valid response to this question is "storage" (C), as it is the only option that represents a covert channel type.
upvoted 2 times
...
BoZT
1 year, 2 months ago
Selected Answer: C
A covert channel is a way for unauthorized information to be transferred between two entities that are not supposed to be able to communicate with each other. There are two main types of covert channels: storage channels and timing channels. Storage channels use shared storage space, such as a hard drive, to transfer information. For example, an attacker could create a hidden file on the hard drive and then modify the file to encode the information they want to transfer. Timing channels use the timing of system events to transfer information. For example, an attacker could measure the time it takes for a system to perform a certain task and then use that information to transfer data.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
It is C, as storage, timing-based, and behavior are the three types of covert channels: https://medium.com/insa-tc/covert-channels-in-computer-networks-26a33fd911b2
upvoted 1 times
...
NJALPHA
1 year, 7 months ago
will go with C Storage-based covert channels. This involves hiding data in some unexpected portion of the message Timing-based covert channels. Time is a parameter, it was used in morse code, so why not use it in packet based networks to create a covert channel
upvoted 2 times
...
Rollingalx
1 year, 9 months ago
A.Pipe A pipe is a type of covert channel that can be used to transfer information between two processes in a way that is not easily detectable by system administrators or security personnel. Covert channels are communication channels that are not intended to be used for information transfer, but can still be used to transfer information due to weaknesses or limitations in the system security mechanisms. Pipes are a common type of covert channel that can be used to transfer information between two processes on the same system by writing to and reading from a shared pipe file.
upvoted 5 times
...
Dee83
1 year, 10 months ago
B. Memory A covert channel is a type of communication channel that allows two processes to communicate in a way that is not intended or visible to an observer. Memory is one example of a covert channel, as two processes can share information by writing to and reading from shared memory, without the observer being aware of it. Other examples of covert channels include timing channels, where two processes communicate by modulating the time of certain events, and storage channels, where they communicate by writing and reading data to and from shared storage devices.
upvoted 2 times
...
DJOEK
1 year, 10 months ago
Selected Answer: D
This is simply a knowledge question from the official study guide 9th edition
upvoted 1 times
...
cobbs
1 year, 11 months ago
Selected Answer: C
Storage - https://study.com/academy/lesson/covert-communication-channels-definition-issues-tunneling.html
upvoted 1 times
...
abb77
2 years ago
Selected Answer: C
storage and timing
upvoted 3 times
...
rdy4u
2 years ago
Selected Answer: C
The existence of a covert storage channel in a communications channel may release information which can be of significant use to attackers. https://owasp.org/www-community/vulnerabilities/Covert_storage_channel
upvoted 2 times
...
jsnow2258
2 years, 1 month ago
Selected Answer: D
D because all the other ones follow strict rules for manipulating data. Creating a covert channel using monitoring must be very smart. I never actually heard about it before, but now that I know about it, sounds very tricky and smart.
upvoted 2 times
...
Oppenheimer
2 years, 1 month ago
Selected Answer: C
storage and timing
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...