Which of the following attacks allows access to contact lists on cellular phones?

A.
War chalking
B.
Blue jacking
C.
Packet sniffing
D.
Bluesnarfing
Explanation:
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers, personal digital assistants (PDAs), and other devices. By
exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can
access information — such as the user’s calendar, contact list and e-mail and text messages —
without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop
computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex
systems. Operating in invisible mode protects some devices, but others are vulnerable as long as
Bluetooth is enabled.