CompTIA Network+ N10-006 Q285

Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?

A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking

Correct Answer: D
Section: Mix questions