Deck 6: Bluetooth and Handheld Device Penetration Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 6: Bluetooth and Handheld Device Penetration Testing
1
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.
A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
Jailbreaking
2
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.
A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
CrashReporter
3
____ refers to hijacking a BlackBerry connection.
A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
Blackjacking
4
The most common attacks on PDAs are ____ attacks.
A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is used to transfer data between two PDA devices over short distances.
A) firewall
B) router
C) infrared port
D) piconet
A) firewall
B) router
C) infrared port
D) piconet
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
____ involves sending messages to devices over Bluetooth.
A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ attack is used to access sensitive data through a Bluetooth device.
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.
A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.
A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck