A _________ is an information path that is not normally used for communication within a computer
system. It is not protected by the any of the systems security mechanisms.
A.
Trojaned program
B.
Backdoor
C.
Covert channel
D.
Hijacked session
E.
Back-path
Explanation:
Covert channels can be used as a secret way to convey information to another person or program
or for other illicit means.