1.

Unauthorised access of information from a wireless device through a bluetooth connection is called _________

A. bluemaking
B. bluesnarfing
C. bluestring
D. bluescoping
Answer» C. bluestring


Discussion

No Comment Found