Bluejacking exploits which wireless technology?

Prepare for the Network+ Exam with the comprehensive Jason Dion's Network+ Course. Utilize flashcards and multiple-choice questions with hints and explanations to master networking concepts and ace your test!

Multiple Choice

Bluejacking exploits which wireless technology?

Explanation:
Bluejacking exploits the discovery and messaging capabilities of Bluetooth. When a device’s Bluetooth is on and set to discoverable, another Bluetooth device can detect it and push a message or contact card to it, typically using the OBEX Object Push profile, without needing to pair first. That reliance on Bluetooth’s discovery and push features is why Bluetooth is the correct answer. Infrared and NFC operate at much closer ranges and different protocols, and Wi‑Fi uses network-based communication rather than the simple discovery-and-push mechanism bluejacking relies on. To reduce risk, keep Bluetooth off when not in use or disable discoverable mode, and pair devices with proper authentication.

Bluejacking exploits the discovery and messaging capabilities of Bluetooth. When a device’s Bluetooth is on and set to discoverable, another Bluetooth device can detect it and push a message or contact card to it, typically using the OBEX Object Push profile, without needing to pair first. That reliance on Bluetooth’s discovery and push features is why Bluetooth is the correct answer. Infrared and NFC operate at much closer ranges and different protocols, and Wi‑Fi uses network-based communication rather than the simple discovery-and-push mechanism bluejacking relies on. To reduce risk, keep Bluetooth off when not in use or disable discoverable mode, and pair devices with proper authentication.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy