A security engineer is assessing a new IoT product. The product interfaces with the ODBII port of a vehicle and uses a Bluetooth connection to relay data to an onboard data logger located in the vehicle. The data logger can only transfer data over a custom USB cable. The engineer suspects a relay attack is possible against the cryptographic implementation used to secure messages between segments of the system. Which of the following tools should the engineer use to confirm the analysis?
A) Binary decompiler
B) Wireless protocol analyzer
C) Log analysis and reduction tools
D) Network-based fuzzer
Correct Answer:
Verified
Q234: A developer is reviewing the following transaction
Q235: A security analyst is classifying data based
Q236: The Chief Financial Officer (CFO) of a
Q237: A Chief Information Security Officer (CISO) is
Q238: A company is migrating systems from an
Q240: A university's help desk is receiving reports
Q241: A security administrator wants to implement controls
Q242: A core router was manipulated by a
Q243: A company recently implemented a variety of
Q244: While conducting online research about a company
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents