ECCouncil Exam Questions

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users w

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient-s con

sent, similar to email spamming?

A. Bluesmacking

B. Bluesniffing

C. Bluesnarfing

D. Bluejacking