Which Bluetooth attack makes unauthorized access to a device via Bluetooth?

Study for the CompTIA SecurityX Test. Equip yourself with comprehensive flashcards and multiple choice questions that include hints and explanations. Gear up for your certification exam!

Multiple Choice

Which Bluetooth attack makes unauthorized access to a device via Bluetooth?

Unauthorized access to the data stored on a Bluetooth device is described by the attack known as Bluesnarfing. It targets information like contacts, messages, calendars, or other personal data by exploiting Bluetooth connections, often when devices are discoverable or have weak permissions, to copy data without the owner’s consent. This makes Bluesnarfing the best fit for the scenario of gaining access to a device via Bluetooth.

By comparison, Bluejacking simply sends unsolicited messages over Bluetooth without accessing or stealing data, so it doesn’t involve breaking into the device. BlueBorne is a broader type of malware-enabled attack that can take over or massively compromise devices via Bluetooth, not just retrieve data. Bluetooth tethering is a legitimate feature for sharing an Internet connection and is not an attack. To reduce risk, keep Bluetooth off when not in use, limit discoverability, and apply updates and strong authentication.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy