What are the two general principles to keep in mind when securing Bluetooth-enabled devices?

What will be an ideal response?


There are two general principles to keep in mind when securing Bluetooth-enabled devices: (1) Turn off Bluetooth when you do not intend to use it, and (2) do not accept an incoming communications pairing request unless you know who the requester is.

Computer Science & Information Technology

You might also like to view...

While viewing a report in Print Preview, the Margins button is found in the ________ group

A) Page Layout B) Data C) Zoom D) Page Size

Computer Science & Information Technology

Which of the following is the array subscripting operator in Java?

A. . B. {} C. new D. []

Computer Science & Information Technology

?Documents on the web stored on web servers are known as web _____.

A. ?pages B. ?sites C. ?links D. ?indices

Computer Science & Information Technology

The repetition, or ________ structure, describes a process that may be repeated as long as a certain condition remains true.

A. loop B. sequential C. random D. selection

Computer Science & Information Technology