Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?

A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking


Answer: D. Bluejacking

Computer Science & Information Technology

You might also like to view...

How does the merge sort algorithm split an array of elements?

a. It uses the size of the array to divide the array into two smaller arrays b. It uses a pivot element c. It splits an array in an arbitrary fashion d. It uses the average of the elements to compute the midpoint

Computer Science & Information Technology

The photo element is used to insert an image into a Web page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

FIGURE EX 8-1 In Figure EX 8-1 above, the phrase "Median Income" is the ____.

A. legend B. vertical axis title C. horizontal axis title D. chart title

Computer Science & Information Technology

Microsoft Office markup tools and specialized ____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content.

A. collaboration software B. online software C. job software D. OCR software

Computer Science & Information Technology