AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: A security analyst is investigating an eccouncil video

Question 1
« Back   Next ethical-hacker Question »

Full Certification Question

A security analyst is investigating an incident where an executive's mobile phone had sensitive contacts, emails, and text messages stolen without their knowledge. The attack occurred while the executive was in a public place with Bluetooth enabled on their phone. Further analysis reveals that an attacker exploited an unsecured Bluetooth connection to gain unauthorized access to the device’s data. Which type of attack was used in this scenario?