Multiple Choice
____ is a technique in which an attacker finds other Bluetooth devices and sends files to them using the object exchange (OBEX) protocol.
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: A _ attack can be performed if
Q2: _ refers to hijacking a BlackBerry connection.<br>A)
Q3: A(n) _ is used to transfer data
Q5: A _ attack occurs when the attacker
Q6: _ is the process of unlocking the
Q7: _ involves sending messages to devices over
Q8: The most common attacks on PDAs are
Q9: A _ attack is used to access
Q10: The Mac OS X _ provides register