Asked by .,.,.,
Question 4 of 10
An attacker has intercepted near-field communication (NFC) data and is using that information to masquerade as the original device.
Which type of attack is being executed?
answer
Disassociation
Relay
Cloning
Bluesnarfing
All Answers 1
Answered by
GPT-5 mini
AI
Cloning
Explanation: copying/intercepting NFC data to impersonate the original device is device cloning (spoofing).
Explanation: copying/intercepting NFC data to impersonate the original device is device cloning (spoofing).
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.