What technique does the threat actor use in a Bluetooth network attack to transmit malicious files to a user's device?
A. Physically stealing a PC or laptop to execute the attack
B. Spoofing a trusted access point to gain unauthorized access
C. Obtaining credentials for remote access to the network
D. Exploiting vulnerabilities or misconfigurations in the Bluetooth protocol