which of the following?

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the
following?

A.
Multiplexing

B.
Zero-day attack

C.
Smurfing

D.
Bluejacking



Leave a Reply 0

Your email address will not be published. Required fields are marked *

4 + 2 =