A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?
a. Bluejacking
b. Bluecracking
c. Bluesnarfing
d. Bluetalking