New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 166 Topic 17 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 166 Topic 17 Discussion

312-50v13 Exam Topic 17 Question 166 Discussion:
Question #: 166
Topic #: 17

A penetration tester evaluates the security of an iOS mobile application that handles sensitive user information. The tester discovers that the application is vulnerable to insecure data transmission. What is the most effective method to exploit this vulnerability?


A.

Execute a SQL injection attack to retrieve data from the backend server


B.

Perform a man-in-the-middle attack to intercept unencrypted data transmitted over the network


C.

Conduct a brute-force attack on the app’s authentication system


D.

Use a Cross-Site Request Forgery (CSRF) attack to steal user session tokens


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.