ExamGecko
Question list
Search
Search

Related questions











Question 421 - 312-50v12 discussion

Report
Export

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker.

Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?

A.
Man-in-the-disk attack
Answers
A.
Man-in-the-disk attack
B.
aLTEr attack
Answers
B.
aLTEr attack
C.
SIM card attack
Answers
C.
SIM card attack
D.
Spearphone attack
Answers
D.
Spearphone attack
Suggested answer: D
asked 18/09/2024
Chad Remick
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first