Multiple Choice
A ____ attack occurs when the attacker has the link keys and unit keys (BD_ADDR) of the Bluetooth devices, allowing him or her to eavesdrop on the conversation between the devices.
A) man-in-the-middle
B) Bluespam
C) BTKeylogging
D) Bluebug
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: A _ attack can be performed if
Q2: _ refers to hijacking a BlackBerry connection.<br>A)
Q3: A(n) _ is used to transfer data
Q4: _ is a technique in which an
Q6: _ is the process of unlocking the
Q7: _ involves sending messages to devices over
Q8: The most common attacks on PDAs are
Q9: A _ attack is used to access
Q10: The Mac OS X _ provides register