Which of the following is an attack that sends unsolicited messages to Bluetooth-enabled devices?
A. Bluesurfing
B. Bluephishing
C. Bluejacking
D. Bluesnarfing
Answer: C
Computer Science & Information Technology
You might also like to view...
?Ashley is working on a PowerPoint presentation. She copies an Access table to insert into a slide. To adapt the copied data to the rest of the formatting in the slide, she should:
A. ?use the Paste as Text command. B. ?use the Insert Object command. C. ?click the Drag and drop button from the Clipboard dialog. D. ?click the Use Destination Theme button when pasting.
Computer Science & Information Technology
What are some of the characteristics of a centralized system that implements a reputation trust model?
What will be an ideal response?
Computer Science & Information Technology