A company wants an administrator to perform a vulnerability test. The administrator finds the
company has a POTS phone system. Which of the following can the administrator use to point out
the phone system vulnerability?
A.
Honeypot
B.
Butt set
C.
Spyware
D.
Blue jacking