Bluetooth Attacks Flashcards

1
Q

Bluejacking

A
  • Sending unsolicited messages to a Bluetooth device
  • Often used for pranks or testing vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluesnarfing

A

Unauthorized access to a device to steal information like contacts, call logs, and text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluebugging

A
  • Allows attackers to take control of a device’s Bluetooth functions
  • Can make calls, send messages, or access the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesmack

A

Denial-of-service attack by overwhelming a device with data, causing it to crash or become unresponsive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BlueBorne

A

Spreads through the air to infect devices without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly