Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 304

Certified Ethical Hacker v11 312-50v11 – Question304

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?

A.
Bluesmacking
B. BlueSniffing
C. Bluejacking
D. Bluesnarfing

Correct Answer: C

Tagged Certified Ethical Hacker v11 312-50v11, Question 304
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!