Which of the following is an attack designed to steal cell phone data and contacts?
A. Bluesnarfing
B. Smurfing
C. Fuzzing
D. Bluejacking
Answer: A. Bluesnarfing
Computer Science & Information Technology
You might also like to view...
Briefly explain the three associated elements of a central processing unit (CPU).
What will be an ideal response?
Computer Science & Information Technology
The BIOS is stored ________
A) on a ROM chip B) on a RAM chip C) in the CPU D) in cache memory
Computer Science & Information Technology
What is the purpose of configuring the IP address Interface VLAN1?
What will be an ideal response?
Computer Science & Information Technology
To select multiple controls, press and hold ________ while clicking with the pointer
A) [Shift] B) [Tab] C) [Alt] D) [Esc]
Computer Science & Information Technology