Emily connected her Android device to a eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for emily connected her Android device to a public computer that had been compromised by Alex, an attacker. Upon establishing the

Full Certification Question

Emily connected her Android device to a public computer that had been compromised by Alex, an attacker. Upon establishing the connection with the public computer, Emily activated the Android Wi-Fi sync feature on the computer, allowing the device to maintain communication with it even after being physically disconnected. Now, Alex gains entry to Emily's Android device through the compromised computer and can observe and access all of Emily's activities on the device, even after it is out of the communication range. Which of the following attacks is executed by Alex in the above scenario?