Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?

A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking

Answer: D. Bluejacking

Computer Science & Information Technology

You might also like to view...

In a relational database, relationships are specified by joining common data stored in records from different tables.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Thepostmethodis the default method that tells the browser to append the form data to the end of the URL specified in theactionattribute. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology