Which of the following attacks would be used if Sara, a user, is receiving unwanted text messages?

A. Packet sniffing
B. Bluesnarfing
C. Smurf attack
D. Blue jacking


Ans: D. Blue jacking

Computer Science & Information Technology

You might also like to view...

Skype enables you to present a Word document through a web browser

Indicate whether the statement is true or false

Computer Science & Information Technology

The tabs on the Ribbon organize the commands into related tasks. The commands on each tab are organized into ____.

A. categories B. sets C. menus D. groups

Computer Science & Information Technology

Which of the following statements about L2TP is true?

a. L2TP uses IPSec for encryption. b. L2TP supports multiple encryption protocols. c. L2TP supports privately registered IP addresses. d. All the above.

Computer Science & Information Technology

The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.

A. CDMA B. ISM C. UNII D. GSM

Computer Science & Information Technology