Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
A. Bluebug attack
B. SQL injection attack
C. Cross site scripting attack
D. Social engineering
E. Bluesnarfing
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
A. Bluebug attack
B. SQL injection attack
C. Cross site scripting attack
D. Social engineering
E. Bluesnarfing