📢 Too many exams? Don’t know which one suits you best? Book Your Free Expert 👉 call Now!


    Question

    _____________ is used by fraudsters to install malware

    through public ports in customers mobile –:
    A Juice Jacking Correct Answer Incorrect Answer
    B Spyware Correct Answer Incorrect Answer
    C Hacking Correct Answer Incorrect Answer
    D Trojan Correct Answer Incorrect Answer
    E None of the above Correct Answer Incorrect Answer

    Solution

    Juice jacking is a theoretical type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.

    Practice Next

    Relevant for Exams:

    ask-question

    Not sure which exam is best for you Talk to our expert

    Get My Free Call