In which of the following attacks does an attacker dump memory by rebooting a victim's device with a malicious OS and then extract sensitive data from the dumped memory?

A. iOS jailbreaking
B. OS data caching
C. Carrier-loaded software
D. User-initiated code


Answer: B. OS data caching

Computer Science & Information Technology

You might also like to view...

Which of the following reasons makes demand paging a desirable fetch policy?

a) Demand paging improves performance for processes with predictable memory-access patterns. b) Demand paging guarantees that the system brings into main memory only those pages that processes actually need. c) Demand paging improves performance by preloading pages that are likely to be needed in the future. d) all of the above

Computer Science & Information Technology

The process of using your contacts, such as friends, relatives, and business associates for obtaining job information is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Generally speaking, the Bevel Extent Out option is the better choice.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the symbols below means “zero or more, without limit”?

a) 0..* b) 0.. c) 0,1,2,… d) -1..*

Computer Science & Information Technology