CERTIVIEW

Wednesday, 25 November 2015

Security+ Question of the Week: Suspicious Location-Based Messages

securityQOW01

On your commute to work each day, you notice that you receive several suspicious messages to your phone. The messages are very similar, appearing on your phone when you drive by a certain building on your regular route to work. In order to test a theory, you place your phone in airplane mode then re‐enable just the 3G/4G feature. After several days of driving past the same location, you do not receive any additional messages. What is the likely cause of these messages?

A. Bluejacking
B. Bluebugging
C. Ad‐hoc wireless network connections
D. Geotagging

Reveal Answer

The correct answer is A.

This situation indicates that bluejacking is taking place. Bluejacking is the sending of messages to a device over Bluetooth. If your Bluetooth adapter is turned off, then you cannot receive bluejack messages.

Answer B, Bluebugging, it the ability for a hacker to remotely control a device over Bluetooth, such as turning on the microphone to use the device as a remote bug. Bluebugging would not trigger messages on your device so this this type of attack is not what is occurring in this situation. Answer C is also incorrect because your device will not auto-connect to and not display message about ad-hoc wireless networks. Infrastructure mode wireless networks hosted by a base station is possible, but not ad-hoc. Answer D, Geotagging, is the recording of GPS or other location information into media or messages on a mobile device. It would not cause messages to appear on your device.

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series

  • Security+ Question of the Week: Deploying a Firewall
  • Security+ Question of the Week: Flood Guard
  • Security+ Question of the Week: iSCSI
  • Security+ Question of the Week: Wireless MAC Filtering
  • Security+ Question of the Week: Quantitative Analysis
  • Security+ Question of the Week: Contracts
  • Security+ Question of the Week: System Clock
  • Security+ Question of the Week: Security Breach Incident Response
  • Security+ Question of the Week: Reduce Electrostatic Discharge
  • Security+ Question of the Week: Planting Malware
  • Security+ Question of the Week: Network Hardening
  • Security+ Question of the Week: Fuzzing
  • Security+ Question of the Week: Single Sign‐On
  • Security+ Question of the Week: Digital Envelope
  • Security+ Question of the Week: Confining Communications to a Subnet
  • Security+ Question of the Week: DoS Tool
  • Security+ Question of the Week: Intranet Defense
  • Security+ Question of the Week: War Driving
  • Security+ Question of the Week: User Rights and Permissions Checks
  • Security+ Question of the Week: Third Party Partnerships
  • Security+ Question of the Week: Indicator of Integrity
  • Security+ Question of the Week: Incident Response Procedure
  • Security+ Question of the Week: Good Password Behavior
  • Security+ Question of the Week: Tailgating
  • Security+ Question of the Week: Differential Backup
  • Security+ Question of the Week: Government and Military
  • Security+ Question of the Week: Backdoor
  • Security+ Question of the Week: Wrong Name or Address
  • Security+ Question of the Week: Increase in Email Hoaxes
  • Security+ Question of the Week: Suspicious Location-Based Messages


from
CERTIVIEW
Posted by Unknown at 03:12
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: certification, CERTIVIEW, course, elearning, Global Knowledge Training Blog, IT, online test, Security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2017 (143)
    • ►  March (19)
    • ►  February (55)
    • ►  January (69)
  • ►  2016 (1230)
    • ►  December (46)
    • ►  November (61)
    • ►  October (65)
    • ►  September (66)
    • ►  August (75)
    • ►  July (39)
    • ►  June (71)
    • ►  May (68)
    • ►  April (175)
    • ►  March (201)
    • ►  February (199)
    • ►  January (164)
  • ▼  2015 (947)
    • ►  December (190)
    • ▼  November (248)
      • What makes these 7 workplaces the best to work
      • Clavister Announces New Clavister E20
      • The Enduring Appeal Of Information Security For IT...
      • SansDigital EliteSTOR ES424X12 JBOD Review
      • 72 per cent of Indian companies faced cyberattacks...
      • Facebook hurts mental well-being, says research re...
      • Videocon Mobiles introduces Z55 Delite, Videocon Z...
      • PMP Formula of the Week: Product Manufacturing Choice
      • A wrong hire is more expensive for a startup than ...
      • QiKU Q Terra with 3GB Ram and 13MP camera launched...
      • Samsung Begins Production Of 128 GB DDR4 Modules
      • CCNP Security Question of the Week: DHCP Server Se...
      • Letv to build a full-scale sports ecosystem in India
      • How To Commit Code To TFS With PowerShell
      • New GSMA study highlights role of mobile in delive...
      • Aqua Mobiles launches 3G 512 dual SIM smartphone a...
      • India Electronics & Semiconductor Association (IES...
      • India’s cheapest local calling service at 19 paise...
      • Cybage claims Recognition from Zinnov for its ente...
      • APT Attacks Can End the World
      • Mobile industry accounts for 6.1 percent of India’...
      • 78.5% growth in Cross Border commerce estimated fo...
      • Venkat Krishnapur named head of operations for Int...
      • ObiWorldphone enters India with the flagship smart...
      • Measuring customer lifetime value keeps companies ...
      • Tanla’s A2P messaging hub touches record monthly h...
      • Citrix partners with government on Digital India i...
      • Best Business Continuity And Disaster Recovery Cer...
      • Security+ Question of the Week: Suspicious Locatio...
      • Samsung PM863 3D TLC V-NAND Enterprise SSD Review
      • Microsemi Wins $2.5 Billion Bidding War For PMC-Si...
      • Benefits of an “Agile” Mindset
      • It’s Time To Change Your Company’s Security Cultur...
      • Letv to enter the Indian Market with disruptive pr...
      • Letv launches LeMall.com to set foot in India
      • mCarbon boosts global footprints, expands its busi...
      • 95% of Android devices were affected in Q3, 2015, ...
      • foodpanda to enter into a partnership with IRCTC
      • The top 3 technology predictions from Gartner
      • Gartner Says Migration to Windows 10 Will Be the F...
      • Sophos appoints Kuldeep Raina as Country Manager (...
      • Why online education is the cure for raising the b...
      • SAP Goes “All In” in Vegas with BI Cloud Software
      • PMP Formula of the Week: CPI of 1.0
      • Booking.com and Concur announce partnership to enh...
      • Smartlink bets big on ‘Make in India’ vision
      • The era of the high tech terrorist
      • The era of the high tech terrorist
      • Swachh Delhi App launched today for Delhiites
      • Web Application Firewall Guide
      • Bidding War For PMC-Sierra Continues, Microsemi Up...
      • CCNA R&S Question of the Week: Characteristics of ...
      • TechProcess’ Paynimo continues its surge momentum ...
      • Six building blocks for creating a digital enterprise
      • Pantel Technologies unveils India’s First Windows ...
      • Six building blocks for creating a digital enterprise
      • Samsung Partners With Netlist, Fires Its First NVD...
      • One Stop Systems Displays HPC Solutions At SC15
      • Condusiv V-locity Makes The Most Of Storage With I...
      • Best Data Center Certifications For 2016
      • Red Hat Announced Release Of Red Hat Enterprise Li...
      • Data Privacy Blog Series Part 2: Tips for Becoming...
      • 113 million Indians lost an average of Rs 16000 du...
      • Google Maps now available in offline mode in India
      • Researchers show how Wi-Fi routers can be used to ...
      • LTO 7 Gains Steam With Sony, Fujifilm Verification
      • Building A Business Case For Network Access Control
      • Seagate Launches Three-Pronged HPC Attack With A20...
      • Free Software Tool Launched To Manage Trendnet Acc...
      • Vapor IO Announces General Availability Of OpenDCRE
      • Extreme Networks To Release 'Industry’s First' Flo...
      • Cisco’s Lancope Acquisition Creates Security Power...
      • Prepping For A Connected Future, Broadcom Delivers...
      • CISSP Question of the Week: OSI Layer for Formatti...
      • How Deltin group automated its marketing & lead ge...
      • AppsFlyer hires Sanjay Trisal as India country man...
      • Synechron appoints Shashi Nirale to lead growth in...
      • Google launches cloud credits for startups in India
      • Red Hat Announces General Availability Of Software...
      • Phicomm launches the stylish Energy 653 4G smartph...
      • Persistent Systems partners with Akumina, strength...
      • Five emerging career paths for future IT aspirants
      • Gigabyte Shows Off Two NVMe-Ready Server Models
      • Aerohive Network's New Connected Experience Platfo...
      • NVMe Over Fabrics Coming To Market As Mangstor Rel...
      • Best Cloud IT Certifications For 2016
      • Huawei Announces NVMe-powered ES3000 V3 PCIe SSD A...
      • Biscom Verosync Update Adds Analytics To File Shar...
      • New 3D TLC NAND Enables $1.50 Per-Usable-GB Cost F...
      • 5G mobile subscriptions to hit 150 million by 2021...
      • ITC Infotech forms strategic partnership with Ramc...
      • World’s largest developer confluence to be hosted ...
      • Apple targets Indian enterprise segment; signs up ...
      • Banks have a $380 Billion market opportunity in Fi...
      • How Indian eCommerce firms are using the power of ...
      • Windows OS Hits the Big 3–0
      • Security Is As Security Does
      • 3D TLC NAND Takes Over AFAs As HPE Announces 3PAR ...
      • Hafele India embraces Qlik to charge up business g...
      • PMP Formula of the Week: What is BAC?
    • ►  October (291)
    • ►  September (218)

About Me

Unknown
View my complete profile
Simple theme. Powered by Blogger.