Question

    _____________ is used by fraudsters to install malware through public ports in customers mobile –:

    A Juice Jacking Correct Answer Incorrect Answer
    B Spyware Correct Answer Incorrect Answer
    C Hacking Correct Answer Incorrect Answer
    D Trojan Correct Answer Incorrect Answer
    E None of the above Correct Answer Incorrect Answer

    Solution

    Juice jacking is a theoretical type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.

    Practice Next

    Relevant for Exams:

    ×
    ×