ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 79 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 79 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 79 Discussion:
Question #: 79
Topic #: 8

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.

What is the type of attack Bob performed on Kate in the above scenario?


A.

Man-in-the-disk attack


B.

aLTEr attack


C.

SIM card attack


D.

Spearphone attack


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.