New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 5 Question 1 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 1
Topic #: 5
[All GPEN Questions]

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Tamra
4 months ago
Agreed, Bluesnarfing fits the bill perfectly!
upvoted 0 times
...
Ngoc
4 months ago
I think it's more about session hijacking, honestly.
upvoted 0 times
...
Dalene
4 months ago
Wait, can e-business cards really do that?
upvoted 0 times
...
Ezekiel
4 months ago
Definitely a case of PDA Hijacking.
upvoted 0 times
...
Brandon
5 months ago
Sounds like classic Bluesnarfing to me!
upvoted 0 times
...
Rodolfo
5 months ago
I feel like this is definitely related to Bluesnarfing, especially since it involves a PDA and accepting something from an unknown source.
upvoted 0 times
...
Destiny
5 months ago
This reminds me of a practice question we had about session hijacking, but that was more about taking over a session rather than copying data.
upvoted 0 times
...
Mica
5 months ago
I remember studying about Bluesnarfing, where unauthorized access is gained to a device via Bluetooth. This seems like it could fit the scenario.
upvoted 0 times
...
Mirta
5 months ago
I'm not entirely sure, but I think PDA Hijacking might be a term used for this kind of attack. It sounds relevant, but I can't recall the specifics.
upvoted 0 times
...
Renea
5 months ago
Hmm, I'm a bit confused here. I'm not sure if I should go with the Bamboo task in option A or the separate stages in Code Stream in option B. I'll need to review the blue-green deployment process again to make sure I understand the best approach.
upvoted 0 times
...
Gretchen
5 months ago
This question seems straightforward. I think the key is to focus on the activities related to the ISO/IEC 27001 certification program.
upvoted 0 times
...
Jody
5 months ago
This question seems straightforward, but I want to make sure I understand the login process correctly.
upvoted 0 times
...
Emily
5 months ago
This seems pretty straightforward. If production exceeds demand, the excess will go into inventory, so the answer must be B.
upvoted 0 times
...

Save Cancel