Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 5 Question 52 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 52
Topic #: 5
[All GSLC Questions]

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Ricki
3 months ago
Wait, is this a trick question? Maybe the executive is just really bad at managing their PDA and the 'odd behavior' is just user error.
upvoted 0 times
...
Reynalda
3 months ago
I don't know, but maybe the attacker is just trying to get a Bluetooth headset to play some tunes. Bluesnarfing could be the answer here.
upvoted 0 times
Dannette
1 months ago
D) Bluesnarfing
upvoted 0 times
...
Ilda
2 months ago
C) Privilege Escalation
upvoted 0 times
...
Alise
2 months ago
B) Session Hijacking
upvoted 0 times
...
Cherelle
2 months ago
A) PDA Hijacking
upvoted 0 times
...
...
Gary
3 months ago
Come on, guys, it's obviously PDA Hijacking. The executive's device is being copied, which is a clear sign of that attack vector.
upvoted 0 times
...
Daniel
3 months ago
Hmm, I'm not convinced. Privilege Escalation seems like a more likely scenario, where the attacker is trying to gain higher levels of access on the PDA.
upvoted 0 times
Gabriele
2 months ago
C: I agree with you, Privilege Escalation makes sense in this situation.
upvoted 0 times
...
Isaiah
2 months ago
B: I think it could be PDA Hijacking, where the attacker takes control of the device remotely.
upvoted 0 times
...
Youlanda
2 months ago
A: It sounds like Bluesnarfing to me, where unauthorized access is gained through Bluetooth.
upvoted 0 times
...
...
Latrice
3 months ago
I'm not sure about that. The question mentions an e-business card, which sounds more like a social engineering attack to me. I'd go with Session Hijacking.
upvoted 0 times
Renato
2 months ago
That makes sense. It's definitely a form of attack on the PDA.
upvoted 0 times
...
Cheryl
3 months ago
I agree, Bluesnarfing is when unauthorized access is gained to information on a wireless device through a Bluetooth connection.
upvoted 0 times
...
Jess
3 months ago
I think it's Bluesnarfing.
upvoted 0 times
...
...
Margret
3 months ago
This seems like a classic case of Bluesnarfing, where the attacker is able to access data on a Bluetooth-enabled device without the owner's knowledge or consent.
upvoted 0 times
Annabelle
2 months ago
We need to be careful about accepting e-business cards from unknown sources to prevent such attacks.
upvoted 0 times
...
Odette
2 months ago
That's right, Bluesnarfing allows unauthorized access to data on Bluetooth devices.
upvoted 0 times
...
Avery
3 months ago
D) Bluesnarfing
upvoted 0 times
...
...
Adelina
4 months ago
I'm not sure, but I think it could also be PDA Hijacking.
upvoted 0 times
...
Elli
4 months ago
I agree with Peggy, Bluesnarfing makes sense in this scenario.
upvoted 0 times
...
Peggy
4 months ago
I think the attack is Bluesnarfing.
upvoted 0 times
...

Save Cancel