Multiple Choice
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set.
A) Bluejacking
B) Bluesnarfing
C) Bluebugging
D) Bluehacking
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q17: What is wireless networking?<br>A)The transmission of packetized
Q18: 802.1x is not is not compatible with
Q19: Physical access to a machine will enable
Q20: The security concern over the so-called WAP
Q21: _ is a term used for the
Q23: _ started with people using chalk on
Q24: Bluejacking is when an attacker uses Bluetooth
Q25: _ is a modulation type that spreads
Q26: 802.11 is the IEEE standard for wireless
Q27: _ is the process by which each