1. Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?
A) Bluejacking B) Rogue tethering C) War chalking D) Bluesnarfing
2. Systems administrator and key support staff come together to simulate a hypothetical interruption of service. The team updates the disaster recovery processes and documentation after meeting. Which of the following describes the team's efforts?
A) Tabletop exercise B) Order of restoration C) Business impact analysis D) Continuity of operation
3. Several workstations on a network are found to be on OS versions that are vulnerable to a specific attack. Which of the following is considered to be a corrective action to combat this vulnerability?
A) Leverage server isolation B) Install an antivirus definition patch C) Install a vendor-supplied patch D) Install an intrusion detection system E) Educate the workstation users
4. Which of the following delineates why it is important to perform egress filtering and monitoring on Internet connected security zones of interfaces on a firewall?
A) To prevent DDoS attacks originating from external network B) To rebalance the amount of outbound traffic and inbound traffic C) Outbound traffic could be communicating to known botnet sources D) Egress traffic is more important than ingress traffic for malware prevention
5. Which of the following control types would a backup of server data provide in case of a system issue?
A) Preventive B) Deterrent C) Corrective D) Detective
1. Right Answer: A Explanation: Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones,PDAs or laptop computers,sending a vCard which typically contains a message in the name field (i.e.,for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Leave a comment