Prepare for the Ethical Hacking Essentials Test. Dive into flashcards and multiple choice questions, with hints and explanations for each one. Ace your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of attack is initiated by compromising Bluetooth devices set to discoverable mode?

  1. Bluejacking

  2. Bluebugging

  3. Bluesnarfing

  4. Bluetooth spoofing

The correct answer is: Bluebugging

The recognition of Bluebugging as the attack initiated by compromising Bluetooth devices set to discoverable mode lies in its specific methodology and targets. Bluebugging occurs when an attacker exploits a Bluetooth-enabled device by connecting to it without authorization, and this often involves devices that are set to discoverable, making them susceptible to being found and subsequently attacked. This type of attack allows the perpetrator to gain unauthorized access to the victim's device to control it, intercept messages, and even make phone calls without the owner's consent. The other methods mentioned in the choices refer to different aspects of Bluetooth vulnerabilities. Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices, typically without compromising their functionality or gaining access. Bluesnarfing is the process of accessing information such as contacts and calendar events from a Bluetooth device without authorization, but it typically requires a different set of vulnerabilities or configurations. Bluetooth spoofing relates to impersonating a Bluetooth device, which is a different technique altogether. Understanding the unique characteristics of these attacks helps in identifying the correct answer and situating it within the broader context of Bluetooth technology vulnerabilities.