A security administrator is configuring policies for corporate-owned, personally enabled (COPE) smartphones. The administrator must ensure that any data exchanged between paired devices over Bluetooth cannot be intercepted by nearby attackers. Which of the following configurations BEST meets this requirement?
Enabling Secure Simple Pairing (SSP) with the Numeric Comparison method establishes an elliptic-curve Diffie-Hellman key during pairing and encrypts the Bluetooth link, providing protection against eavesdropping and man-in-the-middle attacks. Full-device (at-rest) encryption and strong unlock passcodes safeguard data stored on the handset, not data in transit. Limiting connectivity to WPA3 affects Wi-Fi, not Bluetooth.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between data at rest and data in transit?
Open an interactive chat with Bash
What is Secure Simple Pairing (SSP) and why is it important?
Open an interactive chat with Bash
What are some common encryption methods for securing Bluetooth communications?