List of questions
Related questions
Question 75 - 212-82 discussion
Richard, a professional hacker, was hired by a marketer to gather sensitive data and information about the offline activities of users from location dat a. Richard employed a technique to determine the proximity of a user's mobile device to an exact location using CPS features. Using this technique. Richard placed a virtual barrier positioned at a static location to interact with mobile users crossing the barrier, identify the technique employed by Richard in this scenario.
A.
Containerization
B.
Over-the-air (OTA) updates
C.
Full device encryption
D.
Ceofencing
Your answer:
0 comments
Sorted by
Leave a comment first