Question: 1 0 . Which type of attack takes place when you leave your phone s Bluetooth setting as discoverable and someone takes control of your

10. Which type of attack takes place when you leave your phones Bluetooth setting as discoverable and someone takes control of your phone and connects it to the Internet?
a.evil twin
b.bluebugging
c.Internet terrorism
d.bluesnarfing
11.Several hospitals have been attacked in the past few years with a fraudulent technique wherein the hospital staff could not access their records and were promised that they would regain access if they settled the requested payment via direct deposits into a bank account. What is the cause for this?
a.time bomb
b.ransomware
c.spyware
d. trap door
12.You get an email containing seemingly legitimate information from your bank with a warning that your account has been compromised. The email requests you to verify some of your information, with a firm warning that you may be blocked out of your account if you do not adhere to the verification request. What is this fraudulent scheme called?
a.phreaking
b.pharming
c.phishing
d.vishing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!