exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 80 discussion

Actual exam question from CompTIA's PT0-002
Question #: 80
Topic #: 1
[All PT0-002 Questions]

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames.
Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

  • A. Sniff and then crack the WPS PIN on an associated WiFi device.
  • B. Dump the user address book on the device.
  • C. Break a connection between two Bluetooth devices.
  • D. Transmit text messages to the device.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
masso435
Highly Voted 1 year, 7 months ago
The answer is B.
upvoted 14 times
tahllious
1 year, 7 months ago
I agree.
upvoted 6 times
...
...
RRabbit_111
Highly Voted 1 year, 3 months ago
B. Dump the user address book on the device Bluesnarfing is a type of attack that involves unauthorized access to a Bluetooth-enabled device. One example of a Bluesnarfing attack is when an attacker accesses a mobile device and downloads the user's address book without their permission. This can be done by using specialized software tools to connect to the device and extract the data stored on it. A. Sniff and then crack the WPS PIN on an associated WiFi device: This is not a Bluesnarfing attack, this is a WiFi-related attack known as WPS cracking attack C. Break a connection between two Bluetooth devices: This is not a Bluesnarfing attack, this is a Denial of Service (DoS) attack D. Transmit text messages to the device: This is not a Bluesnarfing attack, this is a Spoofing attack
upvoted 9 times
...
solutionz
Most Recent 8 months, 3 weeks ago
Selected Answer: B
Bluesnarfing is a type of unauthorized access to a Bluetooth device, where an attacker can access and copy information stored on the device without the owner's knowledge or consent. Among the options provided, the one that best represents a Bluesnarfing attack would be: B. Dump the user address book on the device. This action would involve accessing and copying sensitive information (in this case, the user's address book) from the targeted device, which aligns with what is typically described as Bluesnarfing.
upvoted 1 times
...
chaser21
9 months, 2 weeks ago
Selected Answer: B
The correct answer is B . Bluesnarfing is an attack to steal data from a Bluetooth device.
upvoted 1 times
...
nickwen007
1 year, 1 month ago
Selected Answer: B
The answer is B. Dump the user address book on the device. Bluesnarfing is an attack that takes advantage of security flaws in Bluetooth-enabled devices, allowing a hacker to access sensitive information such as phone book contacts and calendar entries.
upvoted 3 times
...
kloug
1 year, 2 months ago
bbbbbbbbbbbb
upvoted 3 times
...
petercorn
1 year, 6 months ago
Selected Answer: B
Bluesnarfing: A Bluetooth attack that allows the hacker to exploit the Bluetooth device and copy data off the device. For example, the hacker could copy the contacts off of a victim’s smartphone.
upvoted 5 times
...
Lee_Lah
1 year, 6 months ago
Selected Answer: B
The answer is B. Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos.
upvoted 4 times
...
RightAsTain
1 year, 7 months ago
Answer is D. C would be BLE and requires NFC to steal info from the device. Right out of the book.
upvoted 1 times
Lee_Lah
1 year, 6 months ago
The answer is B. It’s not D because D is bluejacking, NOT bluesnarfing. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones
upvoted 5 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago