07 Flashcards

1
Q

What is the Alphanumeric limit of QR codes?

A

4000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the numeric character limit of QR codes?

A

7000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What components make up an NFC device?

A

Intiator,Target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What components make up an RFID device?

A

Interrogator/Reader
tag
antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What communication/transmission modes is NFC capable of?

A

Simplex, half-duplex, full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of devices capable of semi-directional antennas?

A

patch,sector,yagi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of devices capable of highly directional antennas?

A

parabolic-dish, grid antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of devices capable of omni-directional antennas?

A

dipole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes up a Bluetooth classic link key?

A

Bd_addr
PIN
Random #s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What has low frequency lte-M or Itu-Iot

A

Let-M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data rate of LTE-M? Frequency?

A

1mb-300kb 1.4ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data rate of ITU-IOT? Frequency?

A

<100kbps-250kbps 200mhz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technique to increase 802.11 data rates involves messing with modulation in order to increase data rates?

A

Higher order of data rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ combines adjacent channels w/in a frequency range to create multiple channels simultaneously

A

Wider channels/channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ is a multi-antenna technology using all antennas simultaneously for one user. Which amendment does it take advantage of including data rate/spatial stream.

A

SU-MIMO
802.11N 150, 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ is a multi-antenna technology using all antennas simultaneously for multiple user. Which amendment does it take advantage of including data rate/spatial stream?

A

MU-MIMO
802.11ac 867, 8

17
Q

____________ subdividing a single channel into resource units that can be designated for up to 9 different destinations

A

OFDMA

18
Q

_____________ takes multiple 802.11 frames and sends them as a single transmission

A

frame aggregation

19
Q

_____________ focuses the signal directly with an omnidirectional antenna

A

transmit beamforming

20
Q

__________ is a type of ____ attack, involves spoofing cts frames and repeatedly sending rts frames. Resulting in the NAV timer getting locked out

Who does this affect?
Any kind of protection?

A

CTS attack, DOS
Everyone, CLinet/AP

Nope

21
Q

__________ is a type of ____ attack, involves sending a flood of spoofed death messages, can be paired with a Mitm, Utilizes _______ frames

Who does this affect?
Any kind of protection?

A

Deauthentication, DOS, Management

Clients only
Nope

22
Q

__________ is a type of ____ attack, involves flooding a frequency with RF

Who does this affect?
Any kind of protection?

A

Jamming,DOS
Everyone
nope

23
Q

What kind of attack involves being in the same layer 3 subnet and utilizes rogue ap?

What kind of connections are required for this to work?

A

Man-In-the_middle

1 wireless connection between any device

24
Q

What kind of attack involves spoofing an Arp response?

Who can be a victim?

What kind of connection is required for this to work?

A

Arp cache poisoning

everyone on that network

wired

25
Q

_________ involves spoofing dns responses

A

dns spoofing

26
Q

_________ involves spoofing the mac address of an already authenticated user

A

Captive Portal Bypass

27
Q

___________ involves spoofing and ip address, when does this not work?

A

IP address spoofing
Whenever the ip you’re trying to spoof is being use don the network

28
Q

____________ an attacker piggybacks off of unfiltered traffic

A

Covert Tunneling