COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

WIRELESS NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Unauthorised access of information from a wireless device through a bluetooth connection is called ____
A
Bluemaking
B
Bluesnarfing
C
Bluestring
D
Bluescoping
Explanation: 

Detailed explanation-1: -Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. It happens without the device user’s permission and often results in the theft of information or some other kind of damage to the device (and user).

Detailed explanation-2: -Bluesnarfing is wireless hacking in which a hacker gains access to your Bluetooth-enabled device without your permission. Once the hacker can access your device, they can download your contacts, calendar entries, text messages, and other sensitive data.

Detailed explanation-3: -About. Bluesniff is a proof of concept bluetooth device discovery tool. Bluesniff can be concidered a bluetooth wardriver of sorts. It is meant to raise awareness of BT security issues and likely has a lot of room for improvement.

There is 1 question to complete.