Which of the following is an attack designed to steal cell phone data and contacts?

A. Bluesnarfing
B. Smurfing
C. Fuzzing
D. Bluejacking


Answer: A. Bluesnarfing

Computer Science & Information Technology

You might also like to view...

Briefly explain the three associated elements of a central processing unit (CPU).

What will be an ideal response?

Computer Science & Information Technology

The BIOS is stored ________

A) on a ROM chip B) on a RAM chip C) in the CPU D) in cache memory

Computer Science & Information Technology

What is the purpose of configuring the IP address Interface VLAN1?

What will be an ideal response?

Computer Science & Information Technology

To select multiple controls, press and hold ________ while clicking with the pointer

A) [Shift] B) [Tab] C) [Alt] D) [Esc]

Computer Science & Information Technology