📢 Too many exams? Don’t know which one suits you best? Book Your Free Expert 👉 call Now!


    âš¡ Month End Offer - Flat 52% Off On All Courses! Enroll Now âš¡
    00:00:00 AM Left

    Question

    _____________ is used by fraudsters to install malware

    through public ports in customers mobile –:
    A Juice Jacking Correct Answer Incorrect Answer
    B Spyware Correct Answer Incorrect Answer
    C Hacking Correct Answer Incorrect Answer
    D Trojan Correct Answer Incorrect Answer
    E None of the above Correct Answer Incorrect Answer

    Solution

    Juice jacking is a theoretical type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.

    Practice Next
    More Previous Year Paper Questions

    Relevant for Exams:

    ask-question