Which tool enables unauthorized downloading of phone books and call lists, and reading SMS messages via Bluetooth connection?

a. RedFang
b. Bluesniff
c. Btscanner
d. BlueBug


ANS: D

Computer Science & Information Technology

You might also like to view...

What are some advantages of using columns and guides?

What will be an ideal response?

Computer Science & Information Technology

What hexadecimal value is represented by the binary value 1101?

A. B B. C C. D D. E

Computer Science & Information Technology

The binary tree traversal operations are different than the ones for binary trees.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a property of a WAN:

a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint.

Computer Science & Information Technology