subject

Ared team actor observes it is common practice to allow cell phones to charge on company computers, but access to the memory storage is blocked. which of the following are common attack techniques that take advantage of this practice? (choose two.)
a. a usb attack that tricks the computer into thinking the connected device is a keyboard, and then sends characters one at a time as a keyboard to launch the attack (a prerecorded series of keystrokes)
b. a usb attack that turns the connected device into a rogue access point that spoofs the configured wireless ssids
c. a bluetooth attack that modifies the device registry (windows pcs only) to allow the flash drive to mount, and then launches a java applet attack
d. a bluetooth peering attack called "snarfing" that allows bluetooth connections on blocked device types if physically connected to a usb port
e. a usb attack that tricks the system into thinking it is a network adapter, then runs a user password hash gathering utility for offline password cracking

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 18:20
What is wi-fi infrastructure? a metropolitan area network that uses radio signals to transmit and receive data a communications technology aimed at providing high-speed wireless data over metropolitan area networks a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves includes the inner workings of a wi-fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a wi-fi signal
Answers: 2
question
Computers and Technology, 24.06.2019 00:30
Use the keyword strategy to remember the meaning of the following word. the meaning for the word has been provided. write your keyword and describe the picture you would create in your mind. obfuscate: to make something so confusing that it is difficult to understand.
Answers: 2
question
Computers and Technology, 24.06.2019 01:00
How can the temperature of a room be raised by 5degreesf?
Answers: 1
question
Computers and Technology, 24.06.2019 17:00
What are some examples of what can be changed through options available in the font dialog box? check all that apply. font family italicizing bolding pasting drop shadow cutting character spacing special symbols
Answers: 2
You know the right answer?
Ared team actor observes it is common practice to allow cell phones to charge on company computers,...
Questions
question
Mathematics, 25.08.2019 15:30
Questions on the website: 13722367