Which of the following attacks would be used if Sara, a user, is receiving unwanted text messages?
A. Packet sniffing
B. Bluesnarfing
C. Smurf attack
D. Blue jacking
Ans: D. Blue jacking
Computer Science & Information Technology
You might also like to view...
Skype enables you to present a Word document through a web browser
Indicate whether the statement is true or false
Computer Science & Information Technology
The tabs on the Ribbon organize the commands into related tasks. The commands on each tab are organized into ____.
A. categories B. sets C. menus D. groups
Computer Science & Information Technology
Which of the following statements about L2TP is true?
a. L2TP uses IPSec for encryption. b. L2TP supports multiple encryption protocols. c. L2TP supports privately registered IP addresses. d. All the above.
Computer Science & Information Technology
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.
A. CDMA B. ISM C. UNII D. GSM
Computer Science & Information Technology