exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 411 discussion

Actual exam question from CompTIA's SY0-601
Question #: 411
Topic #: 1
[All SY0-601 Questions]

An employee used a corporate mobile device during a vacation. Multiple contacts were modified in the device during the employee's vacation. Which of the following attack methods did an attacker use to insert the contacts without having physical access to the device?

  • A. Jamming
  • B. Bluejacking
  • C. Disassociation
  • D. Evil twin
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Random_Leaf_Ninja127
Highly Voted 1 year, 11 months ago
Selected Answer: B
B. Bluejacking The attack method used to insert contacts into the corporate mobile device without physical access is called "Bluejacking." Bluejacking is a type of cyberattack where an attacker sends unsolicited messages or contacts to Bluetooth-enabled devices, such as smartphones, tablets, or laptops. The attack takes advantage of the Bluetooth feature's ability to discover nearby devices and receive incoming messages or contacts. In this scenario, while the employee was on vacation, an attacker likely exploited the Bluetooth feature on the corporate mobile device to send and insert modified contacts into the device. The attack is carried out without the attacker needing to physically access the device, as long as the device's Bluetooth functionality is enabled and set to discoverable mode.
upvoted 7 times
...
ganymede
Highly Voted 1 year, 6 months ago
Selected Answer: B
B. Bluejacking. They are ALL wrong. But bluejacking is the least wrong. I think that bluesnarfing would be the best answer if it where there.
upvoted 5 times
dizzydwarf
1 year, 6 months ago
Bluesnarfing is term used for theft of information over bluetooth, not the sending of information.
upvoted 2 times
...
...
Nemish71
Most Recent 1 year, 2 months ago
Selected Answer: B
In this scenario, the attacker likely sent the contacts to the employee's corporate mobile device via Bluetooth while the device was in discoverable mode during the vacation.
upvoted 1 times
...
LordJaraxxus
1 year, 3 months ago
Selected Answer: B
Bluesnarfing is the unauthorized access to or theft of information from a Bluetooth device
upvoted 3 times
...
memodrums
1 year, 4 months ago
Selected Answer: B
Bluesnarfing is the real answer. Bluejacking just sends unsolicited messages to your phone.
upvoted 4 times
...
andresalcedo
1 year, 10 months ago
Selected Answer: D
it would be correct if it was bluesnarfing, the correct answer is the letter D.
upvoted 3 times
je123
1 year, 10 months ago
Do some basic googling before you post inaccurate information. https://www.geeksforgeeks.org/what-is-bluejacking/ Steps To Bluejack A Device Bluejacker opens his contacts and creates a new contact. He does not save a name and number rather he saves the message in place of the contact and does not need to save a number (It is optional if he wants to send a business card, he can save the number). He would scan for nearby Bluetooth devices. He would then share the contact with the Bluetooth device connected. The message will reach the recipient and he will have no clue as to who had sent the message.
upvoted 7 times
...
...
ciucaxz
2 years ago
Bluejacking: Bluejacking is where an attacker takes control of a Bluetooth device such as a phone. They are then able to make phone calls and send text messages.(probably even modify contacts)
upvoted 1 times
...
jocular12
2 years ago
Selected Answer: D
I don't think it's bluejacking guys mainly because the question said that the contacts were "modified". You wouldn't be able to do that with bluejacking only with bluesnarfing. But since bluesnarfing is not an option, I have to go with evil twin. "Bluesnarfing takes advantage of security weaknesses in older Bluetooth implementations, specifically the OBEX (Object Exchange) protocol used for transferring data between Bluetooth devices. By exploiting these vulnerabilities, an attacker can gain unauthorized access to the target device's data, including contacts, text messages, emails, calendars, photos, and other stored information. The process of bluesnarfing typically involves an attacker using specialized software and tools to discover vulnerable Bluetooth devices within their range. Once a vulnerable device is identified, the attacker establishes a connection with it without the user's knowledge or consent. This allows the attacker to extract or manipulate data on the compromised device."
upvoted 3 times
LeDarius3762
1 year, 10 months ago
I think B) Bluejacking is the correct answer because in order to modify the contacts you need to do it manually or send a modified vcard (.vcf FILE) by bluetooth (I did this to transfer my contacts from one phone to another, via bluetooth) Evil twin is meant to piggyback internet sessions, so they can monitor your web visits, so they can steal your information for phishing and fraud. So I don't see the correlance between modified contacts in a phone with stealing your credentials... Just my opinion, I'm open to debate or correct me if my reasoning is wrong, thank you
upvoted 1 times
...
...
ApplebeesWaiter1122
2 years, 1 month ago
Selected Answer: B
The correct answer is B. Bluejacking is a method in which an attacker sends unsolicited messages or contacts to nearby Bluetooth-enabled devices, typically for spamming or phishing purposes. The attacker does not need physical access to the device and can transmit the data from a short distance away. In this case, the employee's mobile device was likely in discoverable mode, which allowed the attacker to send the modified contacts to the device via Bluetooth.
upvoted 4 times
...
fouserd
2 years, 1 month ago
Selected Answer: B
An attacker could have used Bluejacking to insert contacts into the corporate mobile device without having physical access to it. Bluejacking is a type of attack that exploits Bluetooth technology to send unsolicited messages or contacts to a device.
upvoted 1 times
...
PsychoYP
2 years, 1 month ago
Bluejacking is a possible method that an attacker could use to insert contacts into a corporate mobile device without having physical access to the device. Bluejacking is a Bluetooth-based attack where the attacker sends unsolicited messages or data to a device over Bluetooth. In this case, the attacker could send a vCard containing the modified contacts to the employee's mobile device over Bluetooth without the employee's knowledge or consent.
upvoted 2 times
...
workhard
2 years, 1 month ago
Selected Answer: B
Quoting Mike Mayer's guide: "Bluejacking involves sending data to a target device, such as a smartphone, usually in the form of unsolicited text messages. Although mostly harmless, bluejacking can be annoying at best and constitutes harassment at worst. Bluejacking does not involve removing data from the device."
upvoted 1 times
...
mouettespaghetti
2 years, 1 month ago
-B is correct The given scenario is suggestive of a possible Bluetooth hacking attack known as "Bluejacking". In a Bluejacking attack, an attacker sends unsolicited messages or vCards (contacts) to nearby Bluetooth-enabled devices, with the intention of causing annoyance or harm. It can also be used to gain access to the target device or execute malicious code. In this case, the employee's mobile device was compromised while connected to an unsecured public network during the vacation.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...