PrepAway - Latest Free Exam Questions & Answers

Which of the following correctly describes Bluejacking?

Which of the following correctly describes Bluejacking?

PrepAway - Latest Free Exam Questions & Answers

A.
Bluejacking is a harmful, malicious attack.

B.
It is the process of taking over another portable device via a Bluetooth-enabled device.

C.
It is commonly used to send contact information.

D.
The term was coined by the use of a Bluetooth device and the act of hijacking another device.

Explanation:
C: Bluetooth is vulnerable to an attack called Bluejacking, which entails an attacker sending an unsolicited message to a device that is Bluetooth-enabled. Bluejackers look for
a receiving device, such as a mobile device or laptop, and then send a message to it. Often, the Bluejacker is trying to send their business card to be added to the victim’s
contact list in their address book. The countermeasure is to put the Bluetooth-enabled device into nondiscoverable mode so that others cannot identify this device in the first
place. If you receive some type of message this way, just look around you. Bluetooth only works within a ten-meter distance, so it is coming from someone close by.
A is incorrect because Bluejacking is actually a harmless nuisance rather than a malicious attack. It is the act of sending unsolicited messages to Bluetooth-enabled devices.
The first act took place in a bank in which the attacker polled the network and found an active Nokia phone. He then sent the message “Buy Ericcson.”
B is incorrect because Bluejacking does not involve taking over another device. It does not give the attacker control of the target device. Rather, the Bluejacker simply sends
an unsolicited message to the Bluetooth-enabled device. These messages are usually text only, but it is possible to also send images or sounds. Victims are often unfamiliar with
Bluejacking and may think their phone is malfunctioning or that they have been attacked by a virus or hijacked by a Trojan horse.
D is incorrect because the term Bluejacking has nothing to do with hijacking, which means to take over something. The name Bluejacking was invented by a Malaysian IT
consultant who sent the message “Buy Ericsson” to another Bluetooth-enabled device.

One Comment on “Which of the following correctly describes Bluejacking?

  1. joe says:

    Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones.

    Sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.




    0



    0

Leave a Reply