Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now,
Clark gains access to Steven's iPhone through the infected computer and is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the communication zone.
Which of the following attacks is performed by Clark in the above scenario?
armangua
Highly Voted 1Â year, 7Â months agoDaniel8660
Most Recent 6Â months, 3Â weeks agoKhedya007
9Â months, 1Â week agoANDRESCB1988
1Â year, 9Â months agoMento
2Â years ago