Deck 6: Bluetooth and Handheld Device Penetration Testing

ملء الشاشة (f)
exit full mode
سؤال
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.

A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.

A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
سؤال
____ refers to hijacking a BlackBerry connection.

A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
سؤال
The most common attacks on PDAs are ____ attacks.

A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
سؤال
A(n) ____ is used to transfer data between two PDA devices over short distances.

A) firewall
B) router
C) infrared port
D) piconet
سؤال
____ involves sending messages to devices over Bluetooth.

A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
سؤال
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
سؤال
A ____ attack is used to access sensitive data through a Bluetooth device.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
سؤال
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
سؤال
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Bluetooth and Handheld Device Penetration Testing
1
____ is the process of unlocking the iPhone or iPod touch in order to install unlicensed applications, add new ringtones, or change the device's wallpaper.

A) Pairing
B) Jailbreaking
C) Wardialing
D) Stack fingerprinting
Jailbreaking
2
The Mac OS X ____ provides register values and basic memory information but does not provide direct access to memory.

A) iDemocracy
B) AppSnapp
C) CrashReporter
D) iNdependence
CrashReporter
3
____ refers to hijacking a BlackBerry connection.

A) Blackjacking
B) Jailbreaking
C) Wardialing
D) Pairing
Blackjacking
4
The most common attacks on PDAs are ____ attacks.

A) man-in-the-middle
B) BTKeylogging
C) Bluesnarfin
D) ActiveSync
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ____ is used to transfer data between two PDA devices over short distances.

A) firewall
B) router
C) infrared port
D) piconet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ involves sending messages to devices over Bluetooth.

A) Bluejacking
B) Bluesmacking
C) Bluesnarfing
D) BTKeylogging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ attack is used to access sensitive data through a Bluetooth device.

A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
A ____ attack can be performed if the target keyboard has a fixed PIN code and the attacker knows its BD_ADDR.

A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.