42. Which of the following attacks enables a malicious person to steal data via
luetooth devices?
(A) Bluesneaking
(B) Bluejacking
(C) Bluesnarfing
(D) Rogue access point

答案:登入後查看
統計: A(0), B(1), C(0), D(0), E(0) #3557284

詳解 (共 1 筆)

#6646043
(A) Bluesneaking(B)...
(共 187 字,隱藏中)
前往觀看
0
0