AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
CompTIA Study Materials
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-601 Practice Question

Using a vulnerability within the Bluetooth software, an attacker can establish a Bluetooth connection with a victim’s phone and gain unauthorized access to the phone’s contents. The attacker is then able to copy the contents. What term best describes this type of attack?

  • Evil twin

  • Jamming

  • Bluesnarfing

  • Bluejacking

This question is for objective:
Attacks, Threats, and Vulnerabilities
Your Score:
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance