Multiple Choice
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection,is known as which of the following terms?
A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q10: Describe a piconet.
Q11: Which of the following self-contained APs are
Q12: Which encryption protocol below is used in
Q13: Explain why it is important to be
Q14: RF signal "noise" that creates interference and
Q16: List and describe the major parts of
Q17: What are the four types of packets
Q18: What is the most common type of
Q19: What device acts like a wireless base
Q20: In ad hoc mode,devices can only communicate