07 Flashcards
What is the Alphanumeric limit of QR codes?
4000
What is the numeric character limit of QR codes?
7000
What components make up an NFC device?
Intiator,Target
What components make up an RFID device?
Interrogator/Reader
tag
antenna
What communication/transmission modes is NFC capable of?
Simplex, half-duplex, full-duplex
What are examples of devices capable of semi-directional antennas?
patch,sector,yagi
What are examples of devices capable of highly directional antennas?
parabolic-dish, grid antenna
What are examples of devices capable of omni-directional antennas?
dipole
What makes up a Bluetooth classic link key?
Bd_addr
PIN
Random #s
What has low frequency lte-M or Itu-Iot
Let-M
Data rate of LTE-M? Frequency?
1mb-300kb 1.4ghz
Data rate of ITU-IOT? Frequency?
<100kbps-250kbps 200mhz
What technique to increase 802.11 data rates involves messing with modulation in order to increase data rates?
Higher order of data rates
______________ combines adjacent channels w/in a frequency range to create multiple channels simultaneously
Wider channels/channel bonding
________ is a multi-antenna technology using all antennas simultaneously for one user. Which amendment does it take advantage of including data rate/spatial stream.
SU-MIMO
802.11N 150, 4
__________ is a multi-antenna technology using all antennas simultaneously for multiple user. Which amendment does it take advantage of including data rate/spatial stream?
MU-MIMO
802.11ac 867, 8
____________ subdividing a single channel into resource units that can be designated for up to 9 different destinations
OFDMA
_____________ takes multiple 802.11 frames and sends them as a single transmission
frame aggregation
_____________ focuses the signal directly with an omnidirectional antenna
transmit beamforming
__________ is a type of ____ attack, involves spoofing cts frames and repeatedly sending rts frames. Resulting in the NAV timer getting locked out
Who does this affect?
Any kind of protection?
CTS attack, DOS
Everyone, CLinet/AP
Nope
__________ is a type of ____ attack, involves sending a flood of spoofed death messages, can be paired with a Mitm, Utilizes _______ frames
Who does this affect?
Any kind of protection?
Deauthentication, DOS, Management
Clients only
Nope
__________ is a type of ____ attack, involves flooding a frequency with RF
Who does this affect?
Any kind of protection?
Jamming,DOS
Everyone
nope
What kind of attack involves being in the same layer 3 subnet and utilizes rogue ap?
What kind of connections are required for this to work?
Man-In-the_middle
1 wireless connection between any device
What kind of attack involves spoofing an Arp response?
Who can be a victim?
What kind of connection is required for this to work?
Arp cache poisoning
everyone on that network
wired
_________ involves spoofing dns responses
dns spoofing
_________ involves spoofing the mac address of an already authenticated user
Captive Portal Bypass
___________ involves spoofing and ip address, when does this not work?
IP address spoofing
Whenever the ip you’re trying to spoof is being use don the network
____________ an attacker piggybacks off of unfiltered traffic
Covert Tunneling