In regards to Bluetooth, what is the inquiry procedure?

A) Is not used in Bluetooth v127.2
B) Enables a Bluetooth device to search for a security hole
C) Is a power management selection where the device checks for power savings
D) Used to discover other Bluetooth devices or allow itself to be discovered

D

Computer Science & Information Technology

You might also like to view...

What practice under the BSIMM involves the detection and correction of security flaws, providing sanity checks and internal/external tests?

A. Deployment - Penetration testing B. SSDL Touchpoints - Security testing C. Deployment - Software environment D. Deployment - Security checks

Computer Science & Information Technology

According to Figure 17.6, can two computers attached to a switched LAN transmit packets simultaneously? Explain.

What will be an ideal response?

Computer Science & Information Technology