An employee used a corporate mobile device during a vacation. Multiple contacts were modified in the device during the employee's vacation. Which of the following attack methods did an attacker use to insert the contacts without having physical access to the device? A. Jamming B. Bluejacking C. Disassociation D. Evil twin Correct Answer: B This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer