Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
A.
Multiplexing
B.
Zero-day attack
C.
Smurfing
D.
Bluejacking
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?
A.
Multiplexing
B.
Zero-day attack
C.
Smurfing
D.
Bluejacking