Which is an unintended communication path that can be used to violate a system security policy. admin 10 years ago A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A.Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact E. Aggregated data set ← Previous question Next question →