You have been tasked with responding to a security incident involving the compromise of a manager's documents. You and your team have determined that the attacker involved copied files via a Bluetooth connection with the manager's unprotected cell phone. What kind of attack was this?

Respuesta :

Answer:

Bluesnarfing Attack.

Explanation:

As the attack involved copying of files via a Bluetooth connection with the manager's unprotected cell phone, this type of compromising and unauthorized access of the valuable information is called Bluesnarfing Attack. As the name suggests Bluesnarfing involves the usage of bluetooth connection for the unauthorized access of the systems generally between Mobile Phones, PCs, Laptops etc.