Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
A.
Man-in-the-middle
B.
Bluejacking
C.
Bluesnarfing
D.
Packet sniffing
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
A.
Man-in-the-middle
B.
Bluejacking
C.
Bluesnarfing
D.
Packet sniffing