Which of the following attacks sends an unsolicited message to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list?
A. bluejacking
B. bluesnarfing
C. bluesmurf
D. bluebombing
A
Explanation: Several attacks can take advantage of Bluetooth technology. Bluejacking is when an unsolicited message is sent to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list. This can be prevented by placing the device in non-discoverable mode.
Computer Science & Information Technology
You might also like to view...
The _______ command is used to move around in the directory structure
Fill in the blank(s) with correct word
Computer Science & Information Technology
Whole structures or fields within a structure can be passed to a function.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology