which of the following? admin 7 years ago Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following? A. Multiplexing B. Zero-day attack C. Smurfing D. Blue jacking ← Previous question Next question →