Which of the following are considered Bluetooth security violations?

Posted by: Pdfprep Category: GISP Tags: , ,

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.
A . Social engineering
B . Bluesnarfing
C . SQL injection attack
D . Bluebug attack
E . Cross site scripting attack

Answer: B,D

Leave a Reply

Your email address will not be published.