Which vulnerability allows the attacker to gain complete control over a device without even being connected to the target device?

Study for the CompTIA SecurityX Test. Equip yourself with comprehensive flashcards and multiple choice questions that include hints and explanations. Gear up for your certification exam!

Multiple Choice

Which vulnerability allows the attacker to gain complete control over a device without even being connected to the target device?

Taking control of a device over Bluetooth without needing a prior connection or pairing is about remote exploitation of the Bluetooth stack. BlueBorne represents this type of vulnerability: it comprises flaws in Bluetooth implementations that allow an attacker to execute code on a target device and gain full control simply by being in range, without any user interaction or pairing. This means the attacker can take over the device, run commands, and potentially spread to others. Bluesnarfing would be about secretly pulling data from the device rather than taking control. Bluejacking involves sending unsolicited messages and doesn’t compromise device control. Bluetooth tethering is a normal feature to share internet access and isn’t a vulnerability.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy