ExamGecko
Question list
Search
Search

Related questions











Question 490 - 312-50v12 discussion

Report
Export

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?

A.
Bluesmacking
Answers
A.
Bluesmacking
B.
BlueSniffing
Answers
B.
BlueSniffing
C.
Bluejacking
Answers
C.
Bluejacking
D.
Bluesnarfing
Answers
D.
Bluesnarfing
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Bluejacking

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.

Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames.

Bluejacking is also confused with Bluesnarfing, which is the way in which mobile phones are illegally hacked via Bluetooth.

asked 18/09/2024
Ryan Campbell
24 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first