2.3 NFC, RFID, Infrared and Bluetooth Flashcards

1
Q

What is NFC used for?

A

Tap-to-pay transactions and mobile wallets like Apple Pay and Google Pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary security risk with NFC?

A

Skimming and eavesdropping attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can NFC security be improved?

A

Enable NFC only when needed and use secure transaction apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RFID used for?

A

Inventory tracking and employee authentication badges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a major security risk with RFID?

A

Signal interception and cloning attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can RFID security be improved?

A

Use two-factor authentication (e.g., RFID + PIN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Infrared (IR) mainly used for?

A

Remote controls and line-of-sight communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is IR more secure than Bluetooth?

A

It requires direct line-of-sight, making interception harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the limitations of Infrared communication?

A

Short range and slow data transfer speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Bluetooth commonly used for?

A

Wireless peripherals like headphones, keyboards, and smartwatches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Bluejacking?

A

Sending unsolicited messages to a Bluetooth device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Bluesnarfing?

A

Stealing data from Bluetooth-enabled devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the BlueBorne attack?

A

A Bluetooth vulnerability that allows full device control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can Bluetooth security be improved?

A

Disable discoverability and turn Bluetooth off when not in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is tethering?

A

Sharing a smartphone’s internet connection via Wi-Fi, Bluetooth, or USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main security risks of mobile hotspots and tethering?

A

Fake hotspots and data interception.

17
Q

How can tethering security be improved?

A

Use only trusted hotspots and enable a VPN.

18
Q

Which mobile connectivity technology is most commonly used for authentication badges?

A

RFID.

19
Q

Which wireless technology uses direct line-of-sight for communication?

A

Infrared (IR).

20
Q

What type of Bluetooth attack involves sending unsolicited messages?

A

Bluejacking.

21
Q

What is a good security practice for using mobile hotspots?

A

Connect only to trusted hotspots and use a VPN.