Infrared, Bluetooth, and NFC Facts Flashcards

1
Q

Bluetooth

A

is designed to allow devices to communicate within a personal area network (PAN) of close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

examples of pan devices are:

A

-cell phones
-personal digital assistants (PDAs)
-printers
-mice
-keyboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluetooth:

A

-is designed for longer distances than infrared (IR) and has lower power consumption.
-requires that devices are in discovery mode to find each and synchronize.
-operates in the 2.4 GHz range and uses adaptive frequency hopping (AFH).
-by using AFH, Bluetooth can automatically detect other devices in the area and avoid the frequencies used by those devices.
-it can switch between 79 channels to avoid interference.
-uses a 128-bit proprietary encryption mechanism to encrypt signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The range of a Bluetooth is determined by its class:

A

-Class 1 devices can transmit up to 100 meters.
-Class 2 devices can transmit up to 10 meters.
-Class 3 devices transmit at a range less than 10 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluetooth v1

A

Operates at a range of 10 meters and speeds up to 1 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bluetooth v2

A

Operates at a range up to 30 meters and speeds up to 1 Mbps.
A special mode called Enhanced Data Rate (EDR) enables transfer rates up to 3 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

bluetooth v3

A

-Operates at a range up to 30 meters and speeds up to 1 Mbps.
-A special mode known as High Speed (HS) allows the Bluetooth device to use a nearby 802.11 link to achieve speeds up to 24 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bluetooth v4

A

-Operates at a range up to 60 meters and speeds up to 1 Mbps (24 Mbps when using High Speed mode).
-Version 4.0 introduced the Bluetooth Low Energy (BLE) standard.
-BLE reduces the power consumption of Bluetooth devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bluetooth v5

A

-Operates at a range up to 240 meters and speeds up to 2 Mbps (48 Mbps when using High Speed mode).
-Bluetooth 5 improves the performance of BLE devices.
-It also introduced the dual audio feature which allows audio to play simultaneously on two connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of connecting two Bluetooth devices is called:

A

pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluetooth uses a typical client/server relationship between two devices. The client (peripheral) device connects to the server (central) device.
For example, headphones (client) connect to a phone (server).

A

facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bluetooth devices use a protocol called _____ to perform the pairing process and exchange data.

A

Object Exchange (OBEX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RFID (Radio Frequency Identification)

A

uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are two types of RFID tags:

A

-Active RFID
-Passive RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ RFID tags have on-board batteries and can send signals over a long distance. Toll passes in vehicles use active RFID.

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ RFID are not powered and rely on the energy transferred by the scanner to transmit data. ID badges, credit cards, and similar devices use these tags.

A

Passive

17
Q

RFID systems are vulnerable to various kinds of attacks, including:

A

-Eavesdropping
-On-path attack
-Denial of service
-Cloning and spoofing

18
Q

An attacker uses an RFID reader to listen to conversations between a tag and the intended reader.

A

Eavesdropping

19
Q

An attacker intercepts a signal from an RFID tag and manipulates the signal before sending it to the intended recipient. This kind of attack is frequently used to take down a system.

A

On-path attack

20
Q

An attacker blocks radio signals or jams the system with interfering noise.

A

Denial of service

21
Q

An attacker creates a copy of an existing tag, then uses the fake tag to gain access to a secure system.

A

Cloning and spoofing

22
Q

To protect against these attacks, RFID chips often operate at different frequencies. This makes it more difficult for an attacker to find and scan them. (true/false)

A

true

23
Q

NFC (near field communication)

A

-is a newer technology that is built on RFID
- allows two-way communication between two devices that are within 2 inches of each other

24
Q

facts about NFC: (1/3)

A

-NFC operates in the 13.56 MHz frequency. It has a maximum transmission speed of 424 Kbps.
-Special chips called NFC chips can send, receive, and store data.

25
Q

facts about NFC: (2/3)

A

Devices using NFC operate in one of three modes:
-Reader/writer mode is used to read information stored on an NFC chip.
-Peer-to-Peer mode enables two devices to communicate and exchange information.
-Card Emulation mode enables the device to function as a smart card to perform contactless payment or ticketing. This mode is typically used by smart phones.

26
Q

facts about NFC: (3/3)

A

Data transmissions can be secured by using encryption algorithms.

27
Q

To connect two devices: (1/5)

A

1) The client device is put in discoverable mode. This means that other nearby Bluetooth devices can see the device.

28
Q

To connect two devices: (2/5)

A

2) The server device sees the client device and sends a pairing request to begin the pairing process.

29
Q

To connect two devices: (3/5)

A

3) A security passkey is exchanged between the two devices to confirm the correct devices are being paired. The passkey can be pre-programmed or manually created depending on the devices being paired.

30
Q

To connect two devices: (4/5)

A

4) If the passkey matches, the two devices are paired.

31
Q

To connect two devices: (5/5)

A

5) Once paired, the devices remember each other and automatically connect in the future. The pairing process does not need to repeat.

32
Q
A