A security engineer is assessing a new IoT product. The product interfaces with the ODBII port of a vehicle and uses a Bluetooth connection to relay data to an onboard data logger located in the vehicle. The data logger can only transfer data over a custom USB cable. The engineer suspects a replay attack is possible against the cryptographic implementation used to secure messages between segments of the system. Which of the following tools should the engineer use to confirm the analysis?
A) Vulnerability scanner
B) Wireless protocol analyzer
C) Log analysis and reduction tools
D) Network-based fuzzer
Correct Answer:
Verified
Q363: A hospital uses a legacy electronic medical
Q364: A security analyst is reviewing the following
Q365: A Chief Information Security Officer (CISO) recently
Q366: An organization is in the process of
Q367: A company uses an enterprise desktop imaging
Q369: A systems administrator at a medical imaging
Q370: An organization's mobile device inventory recently provided
Q371: A financial institution would like to store
Q372: A manufacturing company's security engineer is concerned
Q373: A company uses an application in its
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents