ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 57 Topic 6 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 57 Topic 6 Discussion

312-50v12 Exam Topic 6 Question 57 Discussion:
Question #: 57
Topic #: 6

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.

Which of the following attacks is performed by Clark in above scenario?


A.

IOS trustjacking


B.

lOS Jailbreaking


C.

Exploiting SS7 vulnerability


D.

Man-in-the-disk attack


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.