List of questions
Related questions
Question 34 - ECSS discussion
William is an attacker who is attempting to hack Bluetooth-enabled devices at public places. Within the target's range, he used special software to obtain the data stored in the victim's device. He used a technique that exploits the vulnerability in the OBject Exchange (OBEX) protocol that Bluetooth uses to exchange information.
Identify the attack performed by William in the above scenario.
A.
Bluesmacking
B.
Bluesnarfing
C.
Bluebugging
D.
Bluejacking
Your answer:
0 comments
Sorted by
Leave a comment first