Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
A.
Multiplexing
B.
Zero-day attack
C.
Smurfing
D.
Blue jacking
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
A.
Multiplexing
B.
Zero-day attack
C.
Smurfing
D.
Blue jacking