Multiple Choice
A ____ attack involves a hacker gaining access to a Bluetooth user's data, but not their device's functions. It ranks second of the three major Bluetooth security problems listed in the book.
A) bluesnarfing
B) bluebugging
C) bluedogging
D) bluejacking
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q105: Every network interface card receives a unique
Q106: A wireless mesh network is a series
Q107: MATCHING<br>-a key typed in by a user
Q108: Using _ technology, you can wirelessly beam
Q109: An SSID may contain up to _
Q111: A _ is a user-entered key that
Q112: In Wi-Fi terms, a(n) _ is an
Q113: MATCHING<br>-a small wireless device that provides a
Q114: Name and briefly describe the three major
Q115: The term "piconet" is used in relationship