An employee used a corporate mobile device during a vacation. Multiple contacts were modified in the device
during the employee's vacation. Which of the following attack methods did an attacker use to insert the
contacts without having physical access to the device?
A. Jamming
B. Bluejacking
C. Disassociation
D. Evil twin
during the employee's vacation. Which of the following attack methods did an attacker use to insert the
contacts without having physical access to the device?
A. Jamming
B. Bluejacking
C. Disassociation
D. Evil twin