Which of the following attacks allows access to contact lists on cellular phones?
A. War chalking
B. Blue jacking
C. Packet sniffing
D. Bluesnarfing
CompTIA exam questions
Which of the following attacks allows access to contact lists on cellular phones?
A. War chalking
B. Blue jacking
C. Packet sniffing
D. Bluesnarfing
An administrator has advised against the use of Bluetooth phones due to bluesnarfing concerns.
Which of the following is an example of this threat?
A. An attacker using the phone remotely for spoofing other phone numbers
B. Unauthorized intrusions into the phone to access data
C. The Bluetooth enabled phone causing signal interference with the network
D. An attacker using exploits that allow the phone to be disabled
If a computer does not have an optical drive, which of the following is the MOST efficient method to install an operating system?
A. Emergency Restore CD
B. Floppy disk
C. USB flash drive
D. Bluetooth connection
Peter, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this?
A. Unintended WiFi connections
B. Cellular data roaming notifications
C. Weak cellular signal
D. Unintended Bluetooth connections