New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSLC Exam - Topic 5 Question 52 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 52
Topic #: 5
[All GSLC Questions]

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Adaline
3 months ago
Wait, can a simple e-business card really lead to this?
upvoted 0 times
...
Yasuko
3 months ago
Agreed, but Bluesnarfing fits better here.
upvoted 0 times
...
Kaitlyn
3 months ago
I thought PDA hijacking was more common in these cases?
upvoted 0 times
...
Beckie
4 months ago
Definitely, that e-business card could have been a trap!
upvoted 0 times
...
Louvenia
4 months ago
Sounds like a classic case of Bluesnarfing.
upvoted 0 times
...
Xochitl
4 months ago
I’m a bit confused about the differences between these terms. Wasn't there something about Session Hijacking being more about web sessions?
upvoted 0 times
...
Velda
4 months ago
I practiced a question similar to this, and I think the key detail is that it started after accepting an e-business card. That makes me lean towards Bluesnarfing.
upvoted 0 times
...
Britt
4 months ago
I'm not entirely sure, but I feel like this could also be a form of PDA Hijacking. It seems like the device is being compromised somehow.
upvoted 0 times
...
Claudio
5 months ago
I remember studying about different types of attacks, and I think this might be related to Bluesnarfing since it involves unauthorized access to data on a device.
upvoted 0 times
...
Cherelle
5 months ago
I'm a little confused on the difference between Bluesnarfing and PDA Hijacking. Could this potentially be a PDA Hijacking attack as well? I want to make sure I fully understand the distinctions before answering.
upvoted 0 times
...
Mireya
5 months ago
Bluesnarfing, for sure. The executive accepting an unknown card and then seeing data being copied is a classic Bluesnarfing scenario. I feel pretty confident about this one.
upvoted 0 times
...
Eladia
5 months ago
Hmm, I'm not totally sure about this one. Could it also be a session hijacking attack if the attacker is somehow intercepting the PDA's data transfer? I'll have to think this through a bit more.
upvoted 0 times
...
Raelene
5 months ago
This one seems pretty straightforward. The executive accepting an e-business card from an unknown person and then seeing odd behavior on the PDA suggests a Bluesnarfing attack.
upvoted 0 times
...
Elin
5 months ago
Okay, let me see. The key details here are the unknown e-business card and the data being copied off the PDA. I think Bluesnarfing is the most likely answer, but I'll double-check the definitions just to be sure.
upvoted 0 times
...
Kristin
5 months ago
This looks like a pretty straightforward question about importing an XML schema into a WSDL document. I'll carefully review the schema and the WSDL code fragments to determine the correct way to do this.
upvoted 0 times
...
Arlyne
5 months ago
This question seems a bit tricky. I'm not totally confident in my understanding of all the PPP protocol details. I'll try to eliminate the options that don't seem relevant, and then make an educated guess.
upvoted 0 times
...
Rebeca
5 months ago
I'm pretty confident the answer is B - Cohesive. That characteristic ensures the requirements work together as a unified whole to fulfill the project's objectives. The other options don't seem to directly address that idea of supporting the overall purpose and scope.
upvoted 0 times
...
Ricki
9 months ago
Wait, is this a trick question? Maybe the executive is just really bad at managing their PDA and the 'odd behavior' is just user error.
upvoted 0 times
...
Reynalda
9 months ago
I don't know, but maybe the attacker is just trying to get a Bluetooth headset to play some tunes. Bluesnarfing could be the answer here.
upvoted 0 times
Dannette
8 months ago
D) Bluesnarfing
upvoted 0 times
...
Ilda
9 months ago
C) Privilege Escalation
upvoted 0 times
...
Alise
9 months ago
B) Session Hijacking
upvoted 0 times
...
Cherelle
9 months ago
A) PDA Hijacking
upvoted 0 times
...
...
Gary
9 months ago
Come on, guys, it's obviously PDA Hijacking. The executive's device is being copied, which is a clear sign of that attack vector.
upvoted 0 times
...
Daniel
10 months ago
Hmm, I'm not convinced. Privilege Escalation seems like a more likely scenario, where the attacker is trying to gain higher levels of access on the PDA.
upvoted 0 times
Gabriele
8 months ago
C: I agree with you, Privilege Escalation makes sense in this situation.
upvoted 0 times
...
Isaiah
8 months ago
B: I think it could be PDA Hijacking, where the attacker takes control of the device remotely.
upvoted 0 times
...
Youlanda
9 months ago
A: It sounds like Bluesnarfing to me, where unauthorized access is gained through Bluetooth.
upvoted 0 times
...
...
Latrice
10 months ago
I'm not sure about that. The question mentions an e-business card, which sounds more like a social engineering attack to me. I'd go with Session Hijacking.
upvoted 0 times
Renato
9 months ago
That makes sense. It's definitely a form of attack on the PDA.
upvoted 0 times
...
Cheryl
9 months ago
I agree, Bluesnarfing is when unauthorized access is gained to information on a wireless device through a Bluetooth connection.
upvoted 0 times
...
Jess
9 months ago
I think it's Bluesnarfing.
upvoted 0 times
...
...
Margret
10 months ago
This seems like a classic case of Bluesnarfing, where the attacker is able to access data on a Bluetooth-enabled device without the owner's knowledge or consent.
upvoted 0 times
Annabelle
9 months ago
We need to be careful about accepting e-business cards from unknown sources to prevent such attacks.
upvoted 0 times
...
Odette
9 months ago
That's right, Bluesnarfing allows unauthorized access to data on Bluetooth devices.
upvoted 0 times
...
Avery
10 months ago
D) Bluesnarfing
upvoted 0 times
...
...
Adelina
11 months ago
I'm not sure, but I think it could also be PDA Hijacking.
upvoted 0 times
...
Elli
11 months ago
I agree with Peggy, Bluesnarfing makes sense in this scenario.
upvoted 0 times
...
Peggy
11 months ago
I think the attack is Bluesnarfing.
upvoted 0 times
...

Save Cancel