Flashcard data - Brainscape (10)

1
Q

Threats to Bluetooth Devices

A

Bluejacking
Bluesniping
Bluesnarfing
War Nibbling/Bluecasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluejacking

A

Sends an unsolicited message to another device that has its Bluetooth connection open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesniping

A

Uses a directional antenna to establish connections with Bluetooth‐enabled devices. Bluetooth has a distance limitation, which may prevent a hacker from establishing a connection. In this situation, the hacker can use a directional antenna to establish connections for up to a mile (1.6 kilometers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

Uses the Bluejacking method to connect to the device, then gain access to the address book, contact information, email, and text messages. ___ uses bluetooth to steal information from a wireless device. A ___ attack can occur using unintended Bluetooth pairing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

War Nibbling/Bluecasing

A

A hacker tries to find unsecured or unpatched Bluetooth connections, then steal information. War Nibbling is similar to War Diving, which is performed on the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Radio Frequency Identifier (RFID) attacks

A

Eavesdropping
Replay
Sniffing
Man-in-the-middle (MITM)
Cloning
Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Near Field Communication (NFC) attacks

A

Eavesdropping
Data modification
MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Initialization Vector (IV)

A

By learning the plaintext of one packet, the attacker tries to compute the RC4 keystream generated by the ___.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domain Hijacking

A

In this attack, the attacker gains access to the domain registration to get hold of the primary DNS information. Then the attacker simply changes the domain information to point to a domain server controlled by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly