Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 296 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 296
Topic #: 1
[All 312-50v12 Questions]

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.

What is the type of attack Bob performed on Kate in the above scenario?

  • A. SIM card attack
  • B. aLTEr attack
  • C. Spearphone attack
  • D. Man-in-the-disk attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: C
A spearphone attack allows Android apps to record loudspeaker data without any privileges.
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: C
CEHv12 2649
upvoted 1 times
...
dobarb
8 months, 2 weeks ago
C. CEH page 2649
upvoted 1 times
...
insaniunt
9 months ago
Selected Answer: C
C. Spearphone attack
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...