Which of the following is not a Bluetooth attack vector?

  1. BlueBugging, which lets an attacker make calls on another Bluetooth phone.

  2. BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook.

  3. BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device.

  4. BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message.


Correct Option: C

AI Explanation

To answer this question, we need to understand the different Bluetooth attack vectors.

Option A) BlueBugging, which lets an attacker make calls on another Bluetooth phone - This option is a legitimate Bluetooth attack vector. An attacker can gain unauthorized access to a Bluetooth phone and make calls.

Option B) BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook - This option is a legitimate Bluetooth attack vector. An attacker can send unsolicited messages or contacts to a Bluetooth device's phonebook.

Option C) BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device - This option is not a valid Bluetooth attack vector. BlueScolding is not a recognized term or attack vector in the context of Bluetooth.

Option D) BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message - This option is a legitimate Bluetooth attack vector. An attacker can send a large volume of ping packets to a Bluetooth device, causing it to crash.

Therefore, the correct answer is C) BlueScolding, as it is not a recognized Bluetooth attack vector.

Find more quizzes: