Which of the following attacks allows access to contact lists on cellular phones?
A.
War chalking
B.
Blue jacking
C.
Packet sniffing
D.
Bluesnarfing
Which of the following attacks allows access to contact lists on cellular phones?
Which of the following attacks allows access to contact lists on cellular phones?
A.
War chalking
B.
Blue jacking
C.
Packet sniffing
D.
Bluesnarfing