Which of the following attacks sends an unsolicited message to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list?
A. bluejacking
B. bluesnarfing
C. bluesmurf
D. bluebombing
A
Explanation: Several attacks can take advantage of Bluetooth technology. Bluejacking is when an unsolicited message is sent to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list. This can be prevented by placing the device in non-discoverable mode.
You might also like to view...
In Java, a block statement is
a) a set of statements that are all indented to the same column. b) a set of statements enclosed in { and }. c) statements that form a rectangular set of characters on the screen. d) a statement that prevents other statements from executing. e) a statement that ends the execution of the program.
A(n) ________ enables a program to read data from the user.
a. printf. b. import declaration. c. Scanner. d. main.
All Java applications must have a method __________.
a. public static Main(String[] args) b. public static Main(String args[]) c. public static void main(String[] args) d. public void main(String[] args) e. public static main(String[] args)
________ refers to the temperature of a photograph
Fill in the blank(s) with correct word