PrepAway - Latest Free Exam Questions & Answers

Which of the following describes how Sara, an attacker,…

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

PrepAway - Latest Free Exam Questions & Answers

A.
Man-in-the-middle

B.
Bluejacking

C.
Bluesnarfing

D.
Packet sniffing

Explanation:
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a
vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1)
transmitters. Bluejacking is usually harmless, but because bluejacked people generally don’t know what has happened, they may think that their phone is
malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well. Bluejacking has been
used in guerrilla marketing campaigns to promote advergames.
Incorrect Answers:
A: In cryptography and computer security, a man-in-the-middle attack is an attack where the attacker secretly relays and possibly alters the communication
between two parties who believe they are directly communicating with each other. One example is active eavesdropping, in which the attacker makes independent
connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in
fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject
new ones. This is straightforward in many circumstances; for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert
himself as a man-in-the-middle. A man in the middle attack is not used to send unwanted advertisements to a mobile device. Therefore, this answer is incorrect.
C: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless
technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the
way Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user’s calendar, contact list and e-mail and text messages —
without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by
virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled. Bluesnarfing is
stealing information over Bluetooth; it is not used to send unwanted advertisements to a mobile device. Therefore, this answer is incorrect.
D: Packet sniffing is the process of intercepting data as it is transmitted over a network. A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If
computers are connected to a local area network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This
doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer,
all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it
reads communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to
the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer.
Packet sniffing is not used to send unwanted advertisements to a mobile device. Therefore, this answer is incorrect.

http://en.wikipedia.org/wiki/Bluejacking
http://en.wikipedia.org/wiki/Man-in-the-middle_attack
http://searchmobilecomputing.techtarget.com/definition/bluesnarfing http://www.techopedia.com/definition/4113/sniffer


Leave a Reply