exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 172 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 172
Topic #: 1
[All 312-50v11 Questions]

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now,
Clark gains access to Steven's iPhone through the infected computer and is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the communication zone.
Which of the following attacks is performed by Clark in the above scenario?

  • A. Man-in-the-disk attack
  • B. iOS jailbreaking
  • C. iOS trustjacking
  • D. Exploiting SS7 vulnerability
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
armangua
Highly Voted 1 year, 7 months ago
"iOS Trustjacking is a vulnerability that can be exploited by an attacker to read messages and emails and capture sensitive information such as passwords and banking credentials from a remote location without a victim’s knowledge. This vulnerability exploits the “iTunes Wi-Fi Sync” feature whereby a victim connects his/her phone to any trusted computer (could be of a friend or any trusted entity) that is already infected by the attacker." CEH Module 17 Page 1521
upvoted 8 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: C
Hacking iOS iOS Trustjacking - is a vulnerability that can be exploited by an attacker to read messages and emails and capture sensitive information from a remote location without the victim’s knowledge.This vulnerability exploits the “iTunes Wi-Fi Sync” feature, where the victim connects their phone to any trusted computer that is already infected by an attacker. (P.2496/2480)
upvoted 4 times
...
Khedya007
9 months, 1 week ago
C is correct answer CEH Module 17 Page 2480
upvoted 2 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 1 times
...
Mento
2 years ago
https://borwell.com/2018/09/06/ios-trustjacking/ C indeed.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago