List of questions
Related questions
Question 421 - 312-50v12 discussion
Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker.
Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?
A.
Man-in-the-disk attack
B.
aLTEr attack
C.
SIM card attack
D.
Spearphone attack
Your answer:
0 comments
Sorted by
Leave a comment first