Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 5 Question 52 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 52
Topic #: 5
[All GSLC Questions]

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Ricki
1 months ago
Wait, is this a trick question? Maybe the executive is just really bad at managing their PDA and the 'odd behavior' is just user error.
upvoted 0 times
...
Reynalda
1 months ago
I don't know, but maybe the attacker is just trying to get a Bluetooth headset to play some tunes. Bluesnarfing could be the answer here.
upvoted 0 times
Ilda
17 days ago
C) Privilege Escalation
upvoted 0 times
...
Alise
19 days ago
B) Session Hijacking
upvoted 0 times
...
Cherelle
21 days ago
A) PDA Hijacking
upvoted 0 times
...
...
Gary
1 months ago
Come on, guys, it's obviously PDA Hijacking. The executive's device is being copied, which is a clear sign of that attack vector.
upvoted 0 times
...
Daniel
1 months ago
Hmm, I'm not convinced. Privilege Escalation seems like a more likely scenario, where the attacker is trying to gain higher levels of access on the PDA.
upvoted 0 times
Isaiah
2 days ago
B: I think it could be PDA Hijacking, where the attacker takes control of the device remotely.
upvoted 0 times
...
Youlanda
21 days ago
A: It sounds like Bluesnarfing to me, where unauthorized access is gained through Bluetooth.
upvoted 0 times
...
...
Latrice
2 months ago
I'm not sure about that. The question mentions an e-business card, which sounds more like a social engineering attack to me. I'd go with Session Hijacking.
upvoted 0 times
Renato
18 days ago
That makes sense. It's definitely a form of attack on the PDA.
upvoted 0 times
...
Cheryl
1 months ago
I agree, Bluesnarfing is when unauthorized access is gained to information on a wireless device through a Bluetooth connection.
upvoted 0 times
...
Jess
1 months ago
I think it's Bluesnarfing.
upvoted 0 times
...
...
Margret
2 months ago
This seems like a classic case of Bluesnarfing, where the attacker is able to access data on a Bluetooth-enabled device without the owner's knowledge or consent.
upvoted 0 times
Annabelle
17 days ago
We need to be careful about accepting e-business cards from unknown sources to prevent such attacks.
upvoted 0 times
...
Odette
26 days ago
That's right, Bluesnarfing allows unauthorized access to data on Bluetooth devices.
upvoted 0 times
...
Avery
1 months ago
D) Bluesnarfing
upvoted 0 times
...
...
Adelina
2 months ago
I'm not sure, but I think it could also be PDA Hijacking.
upvoted 0 times
...
Elli
2 months ago
I agree with Peggy, Bluesnarfing makes sense in this scenario.
upvoted 0 times
...
Peggy
3 months ago
I think the attack is Bluesnarfing.
upvoted 0 times
...

Save Cancel