CompTIA Exam Questions

which of the following?

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?

A.
Multiplexing

B.
Zero-day attack

C.
Smurfing

D.
Bluejacking