ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 34 - ECSS discussion

Report
Export

William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target's range, he used special software to obtain the data stored in the victim's device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.

Identify the attack performed by William in the above scenario.

A.

Bluesmacking

Answers
A.

Bluesmacking

B.

Bluesnarfing

Answers
B.

Bluesnarfing

C.

Bluebugging

Answers
C.

Bluebugging

D.

Bluejacking

Answers
D.

Bluejacking

Suggested answer: B

Explanation:

William performed theBluesnarfingattack. Bluesnarfing is a technique where an attacker exploits a vulnerability in theOBject Exchange (OBEX)protocol used by Bluetooth to exchange information. By doing so, the attacker gains unauthorized access to data stored on the victim's Bluetooth-enabled device.

EC-Council Certified Security Specialist (E|CSS) documents and study guide.

EC-Council Certified Security Specialist (E|CSS) course materials1234

asked 24/10/2024
Michel van Klaveren
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first