Which two Bluetooth Low Energy (BLE) statements are true? (Choose two.)

IT Questions BankCategory: Ethical HackerWhich two Bluetooth Low Energy (BLE) statements are true? (Choose two.)

Which two Bluetooth Low Energy (BLE) statements are true? (Choose two.)

  • All BLE-enabled devices implement cryptographic functions.
  • BLE involves a five-phase process to establish a connection.
  • Threat actors can listen to BLE advertisements and leverage misconfigurations.
  • BLE advertisement can be intercepted using specialized antennas and equipment.
  • BLE pairing is done by mobile apps.

Explanation: Threat actors can listen to BLE advertisements and leverage misconfigurations. You can analyze protocols such as BLE by using specialized antennas and equipment. Many devices that support BLE do not even implement BLE-layer encryption. BLE involves a three-phase process to establish a connection. BLE pairing is done at the operating system level.

Exam with this question: Ethical Hacker: Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x