Some mobile devices are jail-broken by connecting via USB cable and then exploiting software
vulnerabilities to get kernel-level access. Which of the following attack types represents this
scenario? (Select TWO).
A.
Session management attack
B.
Protocol fuzzing
C.
Root-kit compromise
D.
Physical attack
E.
Privilege escalation
F.
Man-in-the-middle