Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?
A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking
Answer: D. Bluejacking
You might also like to view...
How does the merge sort algorithm split an array of elements?
a. It uses the size of the array to divide the array into two smaller arrays b. It uses a pivot element c. It splits an array in an arbitrary fashion d. It uses the average of the elements to compute the midpoint
The photo element is used to insert an image into a Web page.
Answer the following statement true (T) or false (F)
FIGURE EX 8-1
In Figure EX 8-1 above, the phrase "Median Income" is the ____.
A. legend B. vertical axis title C. horizontal axis title D. chart title
Microsoft Office markup tools and specialized ____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content.
A. collaboration software B. online software C. job software D. OCR software