FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are conducting a wireless security audit and find a smartphone with its Bluetooth enabled and in discovery mode. You connect to the Bluetooth device by pairing to it with the default PIN and send a message to the owner of the device to turn off their Bluetooth and to come to your office in order to get the device reconfigured. What type of attack did you conduct?
A
BlueSnarfing
B
BlueJacking
C
Bluesmacking
D
Bluequery
Explanation: 

Detailed explanation-1: -The security of Bluetooth uses the concept of two separate keys, an authentication key and an encryption key. The authentication key is the master key, and encryption keys are regenerated with each new session. A random number, generated for each transaction, adds additional security.

Detailed explanation-2: -One of the techniques Bluetooth technology uses to overcome interference and find a clear transmission path that avoids packet collision is the application of a form of frequency-hopping spread spectrum (FHSS) called adaptive frequency hopping (AFH).

Detailed explanation-3: -Bluetooth device looks for other Bluetooth devices in range: To be found by other Bluetooth devices, the first device, Device 1 must be set to discoverable mode-this will allow other Bluetooth devices in the vicinity to detect its presence and attempt to establish a connection.

Detailed explanation-4: -Paging (Connecting)–Paging is the process of forming a connection between two Bluetooth devices. Before this connection can be initiated, each device needs to know the address of the other (found in the inquiry process).

There is 1 question to complete.