subject

Ared team actor observes it is common practice to allow cell phones to charge on company computers, but access to the memory storage is blocked. which of the following are common attack techniques that take advantage of this practice? (choose two.)
a. a usb attack that tricks the computer into thinking the connected device is a keyboard, and then sends characters one at a time as a keyboard to launch the attack (a prerecorded series of keystrokes)
b. a usb attack that turns the connected device into a rogue access point that spoofs the configured wireless ssids
c. a bluetooth attack that modifies the device registry (windows pcs only) to allow the flash drive to mount, and then launches a java applet attack
d. a bluetooth peering attack called "snarfing" that allows bluetooth connections on blocked device types if physically connected to a usb port
e. a usb attack that tricks the system into thinking it is a network adapter, then runs a user password hash gathering utility for offline password cracking

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 22:20
Avariable of the data type arrays is storing 10 quantities. what is true about these quantities? a. the quantities all have different characteristics. b. the quantities all have the same characteristics. c. five quantities have the same and five have different characteristics. d. it is necessary for all quantities to be integers. e. it is necessary for all quantities to be characters.
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
What does 21 pilots middle aged name as a band 15 years prior to them naming their band 21 pilots?
Answers: 1
question
Computers and Technology, 23.06.2019 13:00
In excel - calculate the actual increase/decrease from first quarter to the second quarter then subtract subtract first quarter value from second quarter total then divide result by first quarter value
Answers: 1
question
Computers and Technology, 23.06.2019 15:20
An ou structure in your domain has one ou per department, and all the computer and user accounts are in their respective ous. you have configured several gpos defining computer and user policies and linked the gpos to the domain. a group of managers in the marketing department need different policies that differ from those of the rest of the marketing department users and computers, but you don't want to change the top-level ou structure. which of the following gpo processing features are you most likely to use? a, block inheritance b, gpo enforcement c, wmi filtering d, loopback processing
Answers: 3
You know the right answer?
Ared team actor observes it is common practice to allow cell phones to charge on company computers,...
Questions
question
Mathematics, 27.08.2021 16:10
question
Mathematics, 27.08.2021 16:10
question
History, 27.08.2021 16:10
Questions on the website: 13722360