In regards to Bluetooth, what is the inquiry procedure?
A) Is not used in Bluetooth v127.2
B) Enables a Bluetooth device to search for a security hole
C) Is a power management selection where the device checks for power savings
D) Used to discover other Bluetooth devices or allow itself to be discovered
D
Computer Science & Information Technology
You might also like to view...
What practice under the BSIMM involves the detection and correction of security flaws, providing sanity checks and internal/external tests?
A. Deployment - Penetration testing B. SSDL Touchpoints - Security testing C. Deployment - Software environment D. Deployment - Security checks
Computer Science & Information Technology
According to Figure 17.6, can two computers attached to a switched LAN transmit packets simultaneously? Explain.
What will be an ideal response?
Computer Science & Information Technology