subject

Ared team actor observes it is common practice to allow cell phones to charge on company computers, but access to the memory storage is blocked. which of the following are common attack techniques that take advantage of this practice? (choose two.)
a. a usb attack that tricks the computer into thinking the connected device is a keyboard, and then sends characters one at a time as a keyboard to launch the attack (a prerecorded series of keystrokes)
b. a usb attack that turns the connected device into a rogue access point that spoofs the configured wireless ssids
c. a bluetooth attack that modifies the device registry (windows pcs only) to allow the flash drive to mount, and then launches a java applet attack
d. a bluetooth peering attack called "snarfing" that allows bluetooth connections on blocked device types if physically connected to a usb port
e. a usb attack that tricks the system into thinking it is a network adapter, then runs a user password hash gathering utility for offline password cracking

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:00
How is the number 110 written when expanded out to place values in the base 2 (binary) number system? options: 2 x 4 + 3 x 2 + 4 x 1 1 x 2 + 1 x 2 + 0 x 2 1 x 100 + 1 x 10 + 0 x 1 1 x 4 + 1 x 2 + 0 x 1
Answers: 1
question
Computers and Technology, 24.06.2019 17:40
File i/o activity objective: the objective of this activity is to practice working with text files in c#. for this activity, you may do all code in the main class. instructions: create an app that will read integers from an input file name numbers.txt that will consist of one integer per record. example: 4 8 25 101 determine which numbers are even and which are odd. write the even numbers to a file named even.txt and the odd numbers to a file named odd.txt.
Answers: 3
question
Computers and Technology, 25.06.2019 01:30
What was the advantage of using transistors instead of vacuum tubes in the second-generation computers? a. computers were drastically reduced in size. b. computers no longer produced errors. c. computers became affordable. d. computers could run on electricity.
Answers: 1
question
Computers and Technology, 25.06.2019 04:40
1. instructions: in your response, make an argument for whether for whether it is better for waketown to build its new wake heights subdivision or to preserve the wake wetlan to preserve the wake wetland preserve. use evidence from at least two of the sources below to support your claim. be sure to introduce your precise claim, develop the claim with evidence from the sources, and demonstrate relationships between ideas. (15 points)
Answers: 2
You know the right answer?
Ared team actor observes it is common practice to allow cell phones to charge on company computers,...
Questions
question
Computers and Technology, 15.04.2021 20:20
question
Geography, 15.04.2021 20:20
Questions on the website: 13722362