
CISSP®- Access Control Categories and Types
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which class of Bluetooth device can reach up to 100 meters?
Class 3
Class 4
Class 2
Class 1
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary weakness of the E0 stream cipher used in Bluetooth?
It requires a wired connection
It is not compatible with mobile devices
It has a short key length
It is too complex to implement
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common assumption made by Bluetooth security regarding MAC addresses?
They are always encrypted
They are unknown to attackers
They change frequently
They are visible to all devices
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Bluejacking?
Sending unsolicited messages via Bluetooth
Disabling Bluetooth on a device
Gaining control of a Bluetooth device
Accessing data on a Bluetooth device
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a recommended strategy to protect against Bluetooth attacks?
Update firmware regularly
Ignore security updates
Use Bluetooth discovery mode at all times
Always keep Bluetooth on
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?