42. Which of the following attacks enables a malicious person to steal data vialuetooth devices?(A) Bluesneaking(B) Bluejacking(C) Bluesnarfing(D) Rogue access point