Multiple Choice
A ____ attack is used to access sensitive data through a Bluetooth device.
A) Bluejacking
B) BTKeylogging
C) Bluespam
D) Bluesnarfing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: A _ attack can be performed if
Q2: _ refers to hijacking a BlackBerry connection.<br>A)
Q3: A(n) _ is used to transfer data
Q4: _ is a technique in which an
Q5: A _ attack occurs when the attacker
Q6: _ is the process of unlocking the
Q7: _ involves sending messages to devices over
Q8: The most common attacks on PDAs are
Q10: The Mac OS X _ provides register