which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth? {Ans: Bluesnarfing}Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what? {Ans: False-positive}Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates.Which of the following protocols Is used by Bella? {Ans: FTPS}Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed In the above scenario?