PdfPrep.com

Which of the following are considered Bluetooth security violations?

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.
A . Social engineering
B . Bluesnarfing
C . SQL injection attack
D . Bluebug attack
E . Cross site scripting attack

Answer: B,D

Exit mobile version