Which of the following attack types represents this scenario?

Some mobile devices are jail-broken by connecting via USB cable and then exploiting software
vulnerabilities to get kernel-level access. Which of the following attack types represents this
scenario? (Select TWO).

Some mobile devices are jail-broken by connecting via USB cable and then exploiting software
vulnerabilities to get kernel-level access. Which of the following attack types represents this
scenario? (Select TWO).

A.
Session management attack

B.
Protocol fuzzing

C.
Root-kit compromise

D.
Physical attack

E.
Privilege escalation

F.
Man-in-the-middle



Leave a Reply 0

Your email address will not be published. Required fields are marked *