Which is a type of cell phone attack in which the attacker's phone appears to be a legitimate roaming cell phone?
a. Cell phone cloning
b. Tumbling
c. Eavesdropping
d. Bluejacking
ANS: B
Computer Science & Information Technology
You might also like to view...
A peripheral interface chip may have several internal registers. Explain the techniques available to reduce the number of address lines required to access these registers. Can you think of any techniques (not discussed in this text) that could be used to allow n address lines to select more than 2n registers?
What will be an ideal response?
Computer Science & Information Technology
Another word for a spider is a ____.?
A. ?virus B. ?bug C. ?crawler D. ?bot
Computer Science & Information Technology
The box symbol represents a temporary file.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Instance variables should always be declared to be public.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology