Exam 6: Bluetooth and Handheld Device Penetration Testing
Exam 1: Wireless Network Penetration Testing10 Questions
Exam 2: Advanced Wireless Testing10 Questions
Exam 3: VoIP Penetration Testing10 Questions
Exam 4: VPN Penetration Testing10 Questions
Exam 5: Wardialing10 Questions
Exam 6: Bluetooth and Handheld Device Penetration Testing10 Questions
Exam 7: Telecommunication and Broadband Communication Penetration Testing10 Questions
Exam 8: Communication Media14 Questions
Select questions type
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
C
____ refers to hijacking a BlackBerry connection.
Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
A
A(n) ____ is used to transfer data between two PDA devices over short distances.
Free
(Multiple Choice)
4.8/5
(47)
Correct Answer:
C
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.
(Multiple Choice)
4.8/5
(36)
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.
(Multiple Choice)
4.8/5
(25)
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.
(Multiple Choice)
4.9/5
(42)
A ____ attack is used to access sensitive data through a Bluetooth device.
(Multiple Choice)
4.8/5
(28)
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.
(Multiple Choice)
4.9/5
(37)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)