PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks allows access to contact lists on cellular phones?

Which of the following attacks allows access to contact lists on cellular phones?

PrepAway - Latest Free Exam Questions & Answers

A.
War chalking

B.
Blue jacking

C.
Packet sniffing

D.
Bluesnarfing

Explanation:
Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers, personal digital assistants (PDAs), and other devices. By
exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can
access information — such as the user’s calendar, contact list and e-mail and text messages —
without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop
computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex
systems. Operating in invisible mode protects some devices, but others are vulnerable as long as
Bluetooth is enabled.


Leave a Reply