Multiple Choice
A security engineer is assessing a new IoT product. The product interfaces with the ODBII port of a vehicle and uses a Bluetooth connection to relay data to an onboard data logger located in the vehicle. The data logger can only transfer data over a custom USB cable. The engineer suspects a relay attack is possible against the cryptographic implementation used to secure messages between segments of the system. Which of the following tools should the engineer use to confirm the analysis?
A) Binary decompiler
B) Wireless protocol analyzer
C) Log analysis and reduction tools
D) Network-based fuzzer
Correct Answer:

Verified
Correct Answer:
Verified
Q121: A regional business is expecting a severe
Q122: An information security manager conducted a gap
Q123: A web developer has implemented HTML5 optimizations
Q124: Engineers at a company believe a certain
Q125: The director of sales asked the development
Q127: A consultant is hired to perform a
Q128: An organization's mobile device inventory recently provided
Q129: After a large organization has completed the
Q130: As part of an organization's compliance program,
Q131: An organization's network security administrator has been