Enhance your CompTIA CASP+ exam readiness with our comprehensive quizzes. Sharpen your skills with detailed flashcards and multiple choice questions, each with hints and in-depth explanations. Prepare effectively for this challenging exam!

Practice this question and more.


What technique involves covert communication channels used by malware to receive updates?

  1. Phishing

  2. Stenography

  3. Keylogging

  4. SQL Injection

The correct answer is: Stenography

The correct answer is steganography. This technique involves concealing information within other non-suspicious files or data, thereby creating covert communication channels. Malware can leverage steganography to hide its updates or commands within seemingly benign files, such as images or audio files. This allows the malware to communicate with a remote server without detection, making it challenging for security measures to identify or block this type of communication. Phishing refers to deceptive attempts to acquire sensitive information by masquerading as a trustworthy entity, typically through emails or fraudulent websites. Keylogging involves recording the keystrokes of a user to capture sensitive data such as passwords or credit card information. SQL injection is a code injection technique that exploits vulnerabilities in database-driven applications, allowing an attacker to manipulate database queries. None of these techniques focus on covert communication channels for malware updates like steganography does.