PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

Joe, an employee is taking a taxi through a busy city and starts to receive unsolicited files sent to his Smartphone. Which of the following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Vishing

B.
Bluejacking

C.
War Driving

D.
SPIM

E.
Bluesnarfing

Explanation:
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a
vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1)
transmitters. Bluejacking is usually harmless, but because bluejacked people generally don’t know what has happened, they may think that their phone is
malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well. Bluejacking has been
used in guerrilla marketing campaigns to promote advergames.
Incorrect Answers:
A: Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized
entities. Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology. A vishing attack can be conducted by
voice email, VoIP (voice over IP), or landline or cellular telephone.
The potential victim receives a message, often generated by speech synthesis, indicating that suspicious activity has taken place in a credit card account, bank
account, mortgage account or other financial service in their name. The victim is told to call a specific telephone number and provide information to “verify identity”
or to “ensure that fraud does not occur.” If the attack is carried out by telephone, caller ID spoofing can cause the victim’s set to indicate a legitimate source, such
as a bank or a government agency. Vishing is not used to send unsolicited files over Bluetooth. Therefore, this answer is incorrect.
C: War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a
city or elsewhere. To do war driving, you need a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some
kind of an antenna which can be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends beyond an office building,
an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources. War
driving is not used to send unsolicited files over Bluetooth. Therefore, this answer is incorrect.
D: SPIM is a term sometimes used to refer to spam over IM (Instant Messaging). It’s also called just spam, instant spam, or IM marketing. No matter what the
name, it consists of unwanted messages transmitted through some form of instant messaging service, which can include Short Message Service (SMS). SPIM is
not used to send unsolicited files over Bluetooth. Therefore, this answer is incorrect.
E: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless
technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the
way Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user’s calendar, contact list and e-mail and text messages —

without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by
virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled. Bluesnarfing is
stealing information over Bluetooth; it is not used to send unwanted advertisements to a mobile device. Therefore, this answer is incorrect.

http://en.wikipedia.org/wiki/Bluejacking
http://searchunifiedcommunications.techtarget.com/definition/vishing http://searchmobilecomputing.techtarget.com/definition/war-driving http://
searchmobilecomputing.techtarget.com/definition/bluesnarfing

One Comment on “Which of the following is this an example of?

  1. meac says:

    As a recap, I must know the difference between BLUEJACKING and BLUESNARFING

    BLUEJACKING – It is a push movement. I introduce something INTO the device via the Bluetooth connection
    BLUESNARFING – It is a PULL movement. I remove something FROM the device via the Bluetooth connection




    0



    0

Leave a Reply