Using a vulnerability within the Bluetooth software, an attacker can establish a Bluetooth connection with a victim’s phone and gain unauthorized access to the phone’s contents. The attacker is then able to copy the contents. What term best describes this type of attack?

  • Bluesnarfing

  • Bluejacking

  • Evil twin

  • Jamming


Your Score:
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance
CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
    • This question is filed here
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance