What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?
A. Bluesnarfing
B. Bluejacking
C. Bluecracking
D. Bluetalking
Answer: B
You might also like to view...
Instance methods that merely get and return the values of an object's instance variables are called ____ methods.
A. passive B. tester C. temp D. accessor
In the function round of Display 3.6, which of these explains what happens in the body of the function? We reproduce the one line from the function body here:
```
return static_cast
Which of the following statements is least likely to be true about a data warehouse?
A. It is constructed for quick searching and ad hoc queries. B. It was an original part of all ERP systems. C. It contains data that are normally extracted periodically from the operating databases. D. It may be deployed by organizations that have not implemented an ERP.
To ensure a unique XML namespace you should use:
a) their Social Security Number b) their address c) an appropriate Web URL d) their last name