which of the following? seenagape 8 years ago Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following? A. Multiplexing B. Zero-day attack C. Smurfing D. Bluejacking ← Previous question Next question →