Which keylogger is installed with one-time physical access to the target machine and then logs keystrokes retrievable via Bluetooth?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which keylogger is installed with one-time physical access to the target machine and then logs keystrokes retrievable via Bluetooth?

Explanation:
This scenario illustrates a hardware keylogger with wireless data exfiltration. A small device is secretly placed with one-time physical access to insert itself between the keyboard and the computer (or inside the keyboard) to capture every keystroke. The distinctive part is that the logs aren’t pulled out physically from the device; instead, they’re retrieved via Bluetooth, meaning the attacker can collect the recorded data remotely once the device is paired or accessible over Bluetooth. Software-based keystroke loggers would require installation on the host system and typically export logs as files or over the network, not via a Bluetooth pull. An external (non-wireless) hardware logger sits in the line between keyboard and PC but would require physical access to extract logs, not wireless Bluetooth retrieval. Hence, a Bluetooth-enabled hardware keylogger best matches the described method of installation plus wireless retrieval.

This scenario illustrates a hardware keylogger with wireless data exfiltration. A small device is secretly placed with one-time physical access to insert itself between the keyboard and the computer (or inside the keyboard) to capture every keystroke. The distinctive part is that the logs aren’t pulled out physically from the device; instead, they’re retrieved via Bluetooth, meaning the attacker can collect the recorded data remotely once the device is paired or accessible over Bluetooth. Software-based keystroke loggers would require installation on the host system and typically export logs as files or over the network, not via a Bluetooth pull. An external (non-wireless) hardware logger sits in the line between keyboard and PC but would require physical access to extract logs, not wireless Bluetooth retrieval. Hence, a Bluetooth-enabled hardware keylogger best matches the described method of installation plus wireless retrieval.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy