CompTIA Exam Questions

Which of the following attacks allows access to contact lists on cellular phones?

Which of the following attacks allows access to contact lists on cellular phones?

A.
War chalking

B.
Blue jacking

C.
Packet sniffing

D.
Bluesnarfing

Explanation:
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers, personal digital assistants (PDAs), and other devices. By
exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can
access information — such as the user’s calendar, contact list and e-mail and text messages —
without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop
computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex
systems. Operating in invisible mode protects some devices, but others are vulnerable as long as
Bluetooth is enabled.