A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
A. Covert channel
B. Integrity axiom
C. Simple rule violation
D. Inferred fact
E. Aggregated data set
Answer: A