A(n) _______________ is an unintended communication path that can be used to violate a
system security policy.
A. Covert channel
B. Integrity axiom
C. Simple rule violation
D. Inferred fact?

Submitted by: Administrator
A. Covert channel
Submitted by: Administrator

Read Online Check Point Certification Job Interview Questions And Answers