Which of the following actions distinguish a bluesnarfing attack from a bluejacking attack? [Choose two that apply.]
a) Unauthorized access to information
b) Sending unsolicited messages
c) Taking control of the device
d) Impersonating a trusted device