Unauthorised access of information from a wireless device through a bluetooth connection is called _________
(a) bluemaking
(b) bluesnarfing
(c) bluestring
(d) bluescoping
The question was posed to me in unit test.
I'm obligated to ask this question of Bluetooth in portion Wireless LAN’s, Electronic Mail and File Transfer of Computer Network