Deck 6: Bluetooth and Handheld Device Penetration Testing

Full screen (f)
exit full mode
Question
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.

A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
Use Space or
up arrow
down arrow
to flip the card.
Question
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.

A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
Question
____ refers to hijacking a BlackBerry connection.

A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
Question
The most common attacks on PDAs are ____ attacks.

A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
Question
A(n) ____ is used to transfer data between two PDA devices over short distances.

A) firewall
B) router
C) infrared port
D) piconet
Question
____ involves sending messages to devices over Bluetooth.

A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
Question
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Question
A ____ attack is used to access sensitive data through a Bluetooth device.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Question
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Question
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Bluetooth and Handheld Device Penetration Testing
1
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.

A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
Jailbreaking
2
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.

A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
CrashReporter
3
____ refers to hijacking a BlackBerry connection.

A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
Blackjacking
4
The most common attacks on PDAs are ____ attacks.

A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is used to transfer data between two PDA devices over short distances.

A) firewall
B) router
C) infrared port
D) piconet
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
____ involves sending messages to devices over Bluetooth.

A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ attack is used to access sensitive data through a Bluetooth device.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.