Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
A . Social engineering
B . Bluesnarfing
C . SQL injection attack
D . Bluebug attack
E . Cross site scripting attack
Answer: B,D