Which tool enables unauthorized downloading of phone books and call lists, and reading SMS messages via Bluetooth connection?
a. RedFang
b. Bluesniff
c. Btscanner
d. BlueBug
ANS: D
Computer Science & Information Technology
You might also like to view...
What are some advantages of using columns and guides?
What will be an ideal response?
Computer Science & Information Technology
What hexadecimal value is represented by the binary value 1101?
A. B B. C C. D D. E
Computer Science & Information Technology
The binary tree traversal operations are different than the ones for binary trees.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is not a property of a WAN:
a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint.
Computer Science & Information Technology