Taisiya is investigating a security incident in which confidential data was stolen from the CFO’s smartphone. As she examines the phone, she notes that Bluetooth is turned on, which is a violation of policy for company phones. She suspects that it was an attack that used Bluetooth. Which attack would this be? a. Blueswiping b. Bluesnarfing c. Bluejacking d. Bluestealing

icon
Related questions
Question

Taisiya is investigating a security incident in which confidential data was stolen from the CFO’s smartphone. As she examines the phone, she notes that Bluetooth is turned on, which is a violation of policy for company phones. She suspects that it was an attack that used Bluetooth. Which attack would this be?

a. Blueswiping

b. Bluesnarfing

c. Bluejacking

d. Bluestealing

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer