CompTIA Security+ SY0-701 Practice Question
Which Bluetooth attack method involves an unauthorized individual gaining unauthorized access to a device's data via a previously paired connection in order to extract sensitive information?
Bluesnarfing
Bluesmacking
Bluebugging
Bluejacking