Which attack involves unauthorized access to a device via its Bluetooth connection?

Prepare for the CompTIA A+ Core 1 (220-1201) Exam. Engage with flashcards and multiple-choice questions, with hints and explanations for each. Ace your exam!

Bluesnarfing is the attack that involves unauthorized access to a device via its Bluetooth connection. This type of attack allows a hacker to access information from a Bluetooth-enabled device, such as contacts, calendars, messages, and other personal data, without the owner's consent. It exploits vulnerabilities in Bluetooth security to steal data, highlighting the importance of keeping Bluetooth connections secure and ensuring devices are not discoverable when not in use.

In contrast, bluejacking is a technique where a message is sent to another Bluetooth device without prior consent, but it does not involve unauthorized access to data. BlueBorne refers to a specific type of vulnerability that can be exploited to take control of a device, but it’s broader than just accessing data via Bluetooth and typically involves taking over the device rather than reading data without permission. Tethering is the process of sharing an internet connection between devices and is not related to any form of unauthorized access or attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy