READ Free Dumps For ECCouncil- 312-50
Question ID 6861 | A large company intends to use Blackberry for corporate mobile phones and a security analyst
is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method
to demonstrate how an attacker could circumvent perimeter defenses and gain access to the
corporate network. What tool should the analyst use to perform a Blackjacking attack?
|
Option A | Paros Proxy
|
Option B | BBProxy
|
Option C | BBCrack
|
Option D | Blooover
|
Correct Answer | b |
Explanation Blackberry users warned of hacking tool threat. Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure Computing Corporation said businesses that have installed Blackberry servers behind their gateway security devices could be vulnerable to a hacking attack from a tool call BBProxy.
Question ID 6863 | Bluetooth uses which digital modulation technique to exchange information between
paired devices?
|
Option A | PSK (phase-shift keying)
|
Option B | FSK (frequency-shift keying)
|
Option C | ASK (amplitude-shift keying)
|
Option D | QAM (quadrature amplitude modulation)
|
Correct Answer | a |
Explanation Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: /4 DQPSK, and 8DPSK.