803 : E-SECURITY (F) Time : 3 Hours Max. Marks : 100 PART-A Answer all questions.

Explanation

Covert channels are used to bypass security controls and can be difficult to detect. They can be used for malicious purposes, such as stealing sensitive information or disrupting system operations.


โฌ† Related Topic

View Topic Hub โ†’

๐Ÿ“˜ Syllabus

View KERALA UNIVERSITY Class 8 Syllabus โ†’

๐Ÿ“ Practice Questions

Practice Previous Year Questions โ†’

๐Ÿค– Practice with AI

Generate Practice Question Paper โ†’


๐Ÿ“š Related Concepts