• Post author:
  • Post category:SEO
  • Reading time:3 mins read
  • Post last modified:June 12, 2024

Which two Bluetooth Low Energy (BLE) statements are true? (Choose two.)

  • Threat actors can listen to BLE advertisements and leverage misconfigurations.
  • BLE pairing is done by mobile apps.
  • BLE involves a five-phase process to establish a connection.
  • BLE advertisement can be intercepted using specialized antennas and equipment.
  • All BLE-enabled devices implement cryptographic functions.
Explanation & Hints:

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments