Which of the following attacks sends an unsolicited message to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list?

A. bluejacking
B. bluesnarfing
C. bluesmurf
D. bluebombing


A
Explanation: Several attacks can take advantage of Bluetooth technology. Bluejacking is when an unsolicited message is sent to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list. This can be prevented by placing the device in non-discoverable mode.

Computer Science & Information Technology

You might also like to view...

In Java, a block statement is

a) a set of statements that are all indented to the same column. b) a set of statements enclosed in { and }. c) statements that form a rectangular set of characters on the screen. d) a statement that prevents other statements from executing. e) a statement that ends the execution of the program.

Computer Science & Information Technology

A(n) ________ enables a program to read data from the user.

a. printf. b. import declaration. c. Scanner. d. main.

Computer Science & Information Technology

All Java applications must have a method __________.

a. public static Main(String[] args) b. public static Main(String args[]) c. public static void main(String[] args) d. public void main(String[] args) e. public static main(String[] args)

Computer Science & Information Technology

________ refers to the temperature of a photograph

Fill in the blank(s) with correct word

Computer Science & Information Technology