CompTIA Security+ Exam Prep

Category - Communication

John is a receiving a lot of spam through the Bluetooth connection in his PDA. What kind of vulnerability is he facing?
  1. Blue mail
  2. Blue Spam
  3. Bluesnarfing
  4. Blue jacking
Explanation
Answer: D - John is being subjected to a Blue jacking attack.

Blue jacking is the sending of unsolicited messages or spam over the Bluetooth connection. Bluesnarfing is gaining unauthorized access through a Bluetooth connection. This access can be gained through a phone, PDA, or any device using Bluetooth. Once access has been gained, the attacker can copy any data in the same way they would with any other unauthorized access.

The system log contains events logged by Windows operating system components. For example, if a driver fails to load during startup, an event is recorded in the system log. The OS predetermines the events that are logged by system components. To view the system logs click Start and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. In the console tree, click Event Viewer and view the system logs section.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz