What kind of channel is created by a C2 with a system that has been compromised?
- wireless channel
- encrypted channel
- covert channel
- command channel
Explanation & Hint: A C2 creates a covert channel with the compromised system. A covert channel is an adversarial technique that allows the attacker to transfer information objects between processes or systems that, according to a security policy, are not supposed to be allowed to communicate. |