COMPUTER PERIPHERALS
MOBILE DEVICES AND SMARTPHONES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Bluetooth security risks may be mitigated by ____
|
using Bluetooth only when required
|
|
using bluetooth all the time
|
|
paring multiple devices
|
|
None of the above
|
Explanation:
Detailed explanation-1: -0 [2, 3], it provides five different security features. That is, pairing, bonding, device authentication, encryption, and message integrity.
Detailed explanation-2: -In general, Bluetooth configuration is set at Security Level 1, i.e. no encryption or authentication. This allows attackers to request information from the device, resulting in a greater risk of theft or device loss.
There is 1 question to complete.