An attacker is analyzing short-range transmissions used by contactless payment devices at a crowded event. Which approach is most effective for capturing credentials from these signals?
Building a counterfeit open Wi-Fi hotspot to siphon user logins
Scanning widely broadcast Bluetooth signals to gather access codes
Configuring a phony base station to redirect cellular calls and messages
Monitoring short-range radio traffic near the device to read payment details
Near-field communication (NFC) interactions require close proximity to intercept the data. NFC stands for Near-field communication (NFC), which is commonly used for contactless transactions. Building fake hotspots or base stations or scanning other radio frequencies does not intercept these short-distance signals, so they are less effective for harvesting payment credentials.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NFC and how does it work?
Open an interactive chat with Bash
Why is NFC interception difficult compared to other wireless communications?
Open an interactive chat with Bash
How do attackers typically exploit NFC vulnerabilities?