which of the following?

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?

A.
Multiplexing

B.
Zero-day attack

C.
Smurfing

D.
Blue jacking



Leave a Reply 0

Your email address will not be published. Required fields are marked *