A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
A. Honeypot
B. Butt set
C. Spyware
D. Blue jacking