Which two Bluetooth Low Energy (BLE) statements are true? (Choose two.)
- Threat actors can listen to BLE advertisements and leverage misconfigurations.
- BLE pairing is done by mobile apps.
- BLE involves a five-phase process to establish a connection.
- BLE advertisement can be intercepted using specialized antennas and equipment.
- All BLE-enabled devices implement cryptographic functions.
Explanation & Hints:
Threat actors can listen to BLE advertisements and leverage misconfigurations. You can analyze protocols such as BLE by using specialized antennas and equipment. Many devices that support BLE do not even implement BLE-layer encryption. BLE involves a three-phase process to establish a connection. BLE pairing is done at the operating system level.
|