IT Questions and Answers :)

Tuesday, December 24, 2019

When I'm in a crowded area, i get a stream of unwanted texts. When i leave the area, the text's stop. Which of the below attacks has occurred?

When I'm in a crowded area, i get a stream of unwanted texts. When i leave the area, the text's stop. Which of the below attacks has occurred?

  • Rogue Access Point
  • Evil Twin
  • Bluesnarfing
  • Bluejacking 

When I'm in a crowded area, i get a stream of unwanted texts. When i leave the area, the text's stop. Which of the below attacks has occurred?

EXPLANATION

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).
Bluebugging goes far beyond bluejacking and bluesnarfing! This is an advanced bluetooth device hacking technique by taking control of other Bluetooth enabled mobile phones or mobile devices to make call, send short message, read and write phonebook, etc. 

Share:

Related Posts:

0 comments:

Post a Comment

 On 30 september 2021, at 20:01, Dominick commented on which of following is not cloud
 On 20 july 2021, at 11:50, Anonymous commented on which of following is false about ddr2
 On 03 march 2021, at 13:49, Anonymous commented on which of following layers is layer 4 in
 On 02 january 2021, at 20:23, Anonymous commented on when open source software is used in
 On 30 october 2020, at 01:42, Anonymous commented on which of following is true regarding
 On 16 october 2020, at 18:27, Anonymous commented on which of following modules cannot be
 On 15 october 2020, at 13:54, Myles commented on in javascript which of following
 On 24 june 2020, at 05:50, Anonymous commented on in which layer of osi model would you
 On 26 may 2020, at 15:01, Myles commented on in javascript which of following
 On 24 february 2020, at 10:56, Anonymous commented on what is difference between tacacs and
 On 18 february 2020, at 11:56, Anonymous commented on what video conferencing application
 On 20 november 2019, at 18:18, Ranjitkumar commented on irq 1 is commonly assigned to the
 On 20 november 2019, at 12:36, RMS commented on irq 1 is commonly assigned to the
 On 06 september 2019, at 14:40, Ranjitkumar commented on what is acronym for management system
 On 06 september 2019, at 11:07, RMS commented on what is acronym for management system
 On 05 september 2019, at 00:48, Anonymous commented on how do you block user from opening
 On 27 august 2019, at 16:47, Anonymous commented on at what location in microsoft windows
 On 23 july 2019, at 22:31, Anonymous commented on in cryptography initialization vector
 On 17 july 2019, at 10:30, Anonymous commented on which of these is not use case of
 On 28 june 2019, at 06:38, Anonymous commented on which of following is not computer

Popular Posts