GIAC Systems and Network Auditor
Question No. 1
An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Choose the correct option from the given list.
01 / 370