Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Exam 312-50v12 All Questions
Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

ECCouncil CEH v12 312-50v12 Question # 89 Topic 10 Discussion

312-50v12 Exam Topic 10 Question 89 Discussion:
Question #: 89
Topic #: 10

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?


A.

Man-in-the-disk attack


B.

aLTEr attack


C.

SIM card attack


D.

Spearphone attack


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.