Which Bluetooth attack makes unauthorized access to a device via Bluetooth?

Study for the CompTIA SecurityX Test. Equip yourself with comprehensive flashcards and multiple choice questions that include hints and explanations. Gear up for your certification exam!

Multiple Choice

Which Bluetooth attack makes unauthorized access to a device via Bluetooth?

Explanation:
Unauthorized access to data on a Bluetooth-enabled device is bluesnarfing. This attack targets the Bluetooth link to copy information from the device—such as contacts, calendars, messages, or other stored data—without permission. It’s about gaining access to the data itself, not just sending something to the device or taking control of it. Bluejacking, in contrast, is simply sending unsolicited messages to nearby devices over Bluetooth and doesn’t give the attacker access to the device’s data. BlueBorne describes a broader vulnerability that can lead to full device compromise or control, which is related but goes beyond just accessing data. Bluetooth tethering is a legitimate feature for sharing Internet access and is not an attack.

Unauthorized access to data on a Bluetooth-enabled device is bluesnarfing. This attack targets the Bluetooth link to copy information from the device—such as contacts, calendars, messages, or other stored data—without permission. It’s about gaining access to the data itself, not just sending something to the device or taking control of it.

Bluejacking, in contrast, is simply sending unsolicited messages to nearby devices over Bluetooth and doesn’t give the attacker access to the device’s data. BlueBorne describes a broader vulnerability that can lead to full device compromise or control, which is related but goes beyond just accessing data. Bluetooth tethering is a legitimate feature for sharing Internet access and is not an attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy