Question: 1 . Question 1 David, a professional hacker, was hired to attack mobile devices owned by an organization. He broadcasted a well - crafted text

1.
Question 1
David, a professional hacker, was hired to attack mobile devices owned by an organization. He broadcasted a well-crafted text message with a malicious link to all the organization's mobile numbers to collect their personal and financial information.
Identify the type of attack performed by David in the above scenario.
1 point
Framing
Click-jacking
Simjacker
SMiShing
2.
Question 2
Sam, a professional hacker, was assigned to attack Bluetooth-enabled devices at a coffee shop. He employed a process to compromise the Bluetooth devices that are set to discoverable mode, then sniffed sensitive data from targeted devices.
Which of the following types of attack has Sam initiated in the above scenario?
1 point
MAC flooding
Man-in-the-mobile
Bluesmacking
Bluebugging

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!