Exam 6: Bluetooth and Handheld Device Penetration Testing

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

C

____ refers to hijacking a BlackBerry connection.

Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
Verified

A

A(n) ____ is used to transfer data between two PDA devices over short distances.

Free
(Multiple Choice)
4.8/5
(47)
Correct Answer:
Verified

C

____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.

(Multiple Choice)
4.8/5
(36)

A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.

(Multiple Choice)
4.8/5
(25)

____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.

(Multiple Choice)
4.9/5
(42)

____ involves sending messages to devices over Bluetooth.

(Multiple Choice)
4.8/5
(34)

The most common attacks on PDAs are ____ attacks.

(Multiple Choice)
4.8/5
(41)

A ____ attack is used to access sensitive data through a Bluetooth device.

(Multiple Choice)
4.8/5
(28)

The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.

(Multiple Choice)
4.9/5
(37)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)