Answer:
BlueBorne Attack
Explanation:
If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.
Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication
Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.
Answer:
Explanation:
A computer system can interact with its environment using hardware that does so such as cameras, robotic arms, thermometers, smart devices etc. These hardware devices gather information from the environment and transfer it to the computer system in a format known as bits through binary electrical impulses.
Answer:
Option A; MINING THE SOCIAL MEDIA INPUTS.
Explanation:
Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.
Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research.
The number listed from phone call would result in long distance charges to your phone bill, therefore, the issue of MINING THE SOCIAL MEDIA INPUTS should be addressed by the company to keep its CRM in line with your expectations.