312-50V13 · Question #398
312-50V13 Question #398: Real Exam Question with Answer & Explanation
The correct answer is D: Spearphone attack. The attack described, where an attacker exploits a phone's loudspeaker to clandestinely monitor its audio output from various data sources, is known as a Spearphone attack.
Question
Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?
Options
- AMan-in-the-disk attack
- BaLTEr attack
- CSIM card attack
- DSpearphone attack
Explanation
The attack described, where an attacker exploits a phone's loudspeaker to clandestinely monitor its audio output from various data sources, is known as a Spearphone attack.
Common mistakes.
- A. A Man-in-the-disk attack involves tampering with data stored on a device's disk by intercepting I/O operations, not exploiting audio hardware.
- B. An aLTEr attack is a type of man-in-the-middle attack that targets LTE cellular networks, specifically by manipulating DNS records, not a phone's internal speaker.
- C. A SIM card attack targets vulnerabilities within the Subscriber Identity Module (SIM) card itself, often to compromise cellular services or gain access to phone functions, which is unrelated to the loudspeaker.
Concept tested. Spearphone attack mechanism
Topics
Community Discussion
No community discussion yet for this question.