Using a vulnerability within the Bluetooth software, an attacker can establish a Bluetooth connection with a victim’s phone and gain unauthorized access to the phone’s contents. The attacker is then able to copy the contents. What term best describes this type of attack?
|Attacks, Threats, and Vulnerabilities|
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|