Which of the following attacks sends an unsolicited message to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list?

A. bluejacking
B. bluesnarfing
C. bluesmurf
D. bluebombing

A
Explanation: Several attacks can take advantage of Bluetooth technology. Bluejacking is when an unsolicited message is sent to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list. This can be prevented by placing the device in non-discoverable mode.

Computer Science & Information Technology

You might also like to view...

The _______ command is used to move around in the directory structure

Fill in the blank(s) with correct word

Computer Science & Information Technology

Whole structures or fields within a structure can be passed to a function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology