Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

A.
Man-in-the-middle

B.
Bluejacking

C.
Bluesnarfing

D.
Packet sniffing



Leave a Reply 0

Your email address will not be published. Required fields are marked *