nerdexam
EC-CouncilEC-Council

312-50V13 · Question #155

312-50V13 Question #155: Real Exam Question with Answer & Explanation

The correct answer is A: A channel that transfers information within a computer system or network in a way that violates. A covert channel is a method of transferring information in a way that is hidden or not intended by the system's design, often violating security policies.

Submitted by jakub_pl· Mar 6, 2026Malware Threats

Question

In Trojan terminology, what is a covert channel?

Options

  • AA channel that transfers information within a computer system or network in a way that violates
  • BA legitimate communication path within a computer system or network for transfer of data
  • CIt is a kernel operation that hides boot processes and services to mask detection
  • DIt is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish

Explanation

A covert channel is a method of transferring information in a way that is hidden or not intended by the system's design, often violating security policies.

Common mistakes.

  • B. A legitimate communication path is an overt channel, designed for communication, which is the antithesis of a covert channel.
  • C. While rootkits might utilize covert channels, 'a kernel operation that hides boot processes and services' describes a rootkit's specific functionality for evasion, not the general definition of a covert channel.
  • D. Reverse tunneling using HTTPS is a specific technique for creating a communication link, which could be used to establish a covert channel, but it is not the definition of a covert channel itself.

Concept tested. Covert channels (Trojan context)

Reference. https://learn.microsoft.com/en-us/security/compass/data-exfiltration#covert-channels

Topics

#covert channel#Trojan#malware#data exfiltration

Community Discussion

No community discussion yet for this question.

Full 312-50V13 PracticeBrowse All 312-50V13 Questions