Free CompTIA Security+ SY0-601 Practice Question

Using a vulnerability within the Bluetooth software, an attacker can establish a Bluetooth connection with a victim’s phone and gain unauthorized access to the phone’s contents. The attacker is then able to copy the contents. What term best describes this type of attack?

  • Jamming

  • Evil twin

  • Bluejacking

  • Bluesnarfing

This question's topic:
CompTIA Security+ SY0-601 / 
Attacks, Threats, and Vulnerabilities
Your Score:

Check or uncheck an objective to set which questions you will receive.