exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 482 discussion

Actual exam question from CompTIA's SY0-601
Question #: 482
Topic #: 1
[All SY0-601 Questions]

An employee received multiple messages on a mobile device. The messages were instructing the employee to pair the device to an unknown device. Which of the follow ng best describes what a malicious person might be doing to cause this issue to occur?

  • A. Jamming
  • B. Bluesnarfing
  • C. Evil twin attack
  • D. Rogue access point
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
memodrums
1 year, 3 months ago
Selected Answer: B
Bluejacking would be the correct answer but Bluesnarfing is the closets.
upvoted 1 times
...
DrCo6991
1 year, 4 months ago
does ng stand for next gen?
upvoted 2 times
[Removed]
1 year, 4 months ago
follow ng = following it is a grammatical error
upvoted 2 times
...
...
Malkhofash
1 year, 4 months ago
B. Bluesnarfing steal from Mobile devices
upvoted 1 times
...
cyberPunk28
1 year, 5 months ago
Selected Answer: B
B. Bluesnarfing
upvoted 1 times
...
Copmp
1 year, 9 months ago
Selected Answer: B
What issue? Nothing has occured yet. Holy shit is this one worded bad. the user got a phone that had a bunch messages telling to PAIR to a device. this would be B. Bluesnarfing because pairing is used for bluetooth.
upvoted 4 times
...
Gamsje
1 year, 10 months ago
Selected Answer: B
Keyword "pair the device" is about Bluetooth. B. Bluesnarfing
upvoted 4 times
...
Selected Answer: B
Bluesnarfing is a type of attack that targets Bluetooth-enabled devices, such as mobile phones and laptops, with the aim of gaining unauthorized access to the device's data and features. Attackers use specialized software tools to exploit vulnerabilities in Bluetooth protocols to connect to and gain control of a device without the owner's knowledge or consent. Once connected, attackers can steal sensitive information, such as contacts, emails, and messages, as well as take control of the device's features, such as making phone calls or sending text messages, without the owner's authorization. Similar to question 411
upvoted 4 times
...
fouserd
2 years ago
Selected Answer: B
The issue of an employee receiving multiple messages on a mobile device instructing them to pair the device to an unknown device is most likely caused by B. Bluesnarfing. Bluesnarfing is a type of attack that exploits vulnerabilities in Bluetooth technology to access data on a wireless device without the owner’s knowledge or consent. In this case, a malicious person could be attempting to use Bluesnarfing to gain unauthorized access to the employee’s mobile device by sending pairing requests and trying to trick the employee into accepting them.
upvoted 1 times
...
if10w
2 years ago
>>>B<<< The malicious activity that might be causing this issue to occur is "Bluesnarfing". Bluesnarfing is a type of attack where a hacker gains unauthorized access to a mobile device via Bluetooth connection. The attacker can then steal sensitive information, such as contacts, messages, and other data, or take control of the device. In this case, the attacker is sending messages to the employee's mobile device, instructing them to pair with an unknown device, which could be used to gain access to the employee's device and steal sensitive information.
upvoted 1 times
...
mouettespaghetti
2 years ago
-B is correct A malicious person might be using Bluesnarfing to cause the issue where an employee received multiple messages on a mobile device instructing the employee to pair the device to an unknown device. Bluesnarfing is a type of wireless attack that involves gaining unauthorized access to a Bluetooth-enabled device, such as a mobile phone, without the user's knowledge or consent. Once access is gained, the attacker can steal data from the device, including contacts, text messages, and other sensitive information.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...