Module 10 Flashcards

1
Q

What are the most widely used wireless networks?

A

Cellular networks, operated by telecom service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of fixed wireless networks?

A

To provide internet access to areas with no wired infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who owns, manages, and charges for cellular networks?

A

Telecom providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of wireless technology uses radio frequency transmission?

A

Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some categories of Bluetooth use?

A

Automotive, Personal, Home Entertainment, Computer, Sports & Fitness, Health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of Bluetooth devices?

A

Hands-free system, wireless headphones, smart door locks, wireless keyboards, heart rate monitors, blood pressure monitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common Bluetooth usage scenarios?

A

Browsing phone, creating playlists, controlling door locks remotely, monitoring heart rate and sleep, sampling data for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the latest Bluetooth version as of 2023?

A

Bluetooth 5.4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) used for?

A

Sharing range with continuous connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the data rate for Bluetooth Low Energy (LE)?

A

1 Mbps, 2 Mbps, 3 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the ranges for Bluetooth connectivity?

A

130 ft (40m), 260 ft (80m), 400 ft (120m).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What factors affect Bluetooth network topology?

A

Distance, transmission power, and antenna gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the roles in Bluetooth network topology?

A

Broadcaster, Observer, Follower (active and inactive).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of Bluetooth network topology?

A

Point-to-point and point-to-multipoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What additional topology does Bluetooth LE support?

A

Many-to-many or mesh networks, which may extend the network range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a scatternet?

A

A network of piconets, rarely used.

17
Q

What is Bluejacking?

A

An attack that sends messages (text, sound, images) to Bluetooth devices, considered annoying but not harmful.

18
Q

What is Bluesnarfing?

A

An attack that accesses and copies information through a Bluetooth connection.

19
Q

What is Near Field Communication (NFC)?

A

A communication protocol allowing two electronic devices to communicate over 4 cm or less.

20
Q

What are the roles in NFC communication?

A

Initiator (actively generates RF field) and Target (can be powered passively).

21
Q

What are examples of NFC usage?

A

Wireless payments, public transport payment systems, computer setup.

22
Q

What are NFC vulnerabilities?

A

Eavesdropping, data theft, MITM attacks, device theft.

23
Q

What are defenses against NFC attacks?

A

Limiting range, encryption, secure elements, authentication.

24
Q

What is Radio Frequency Identification (RFID)?

A

The use of radio waves to read and capture information from a tag attached to an object.

25
Q

How far can an RFID tag be read from?

A

Several feet away, without requiring direct line-of-sight.

26
Q

What is the maximum amount of data an RFID tag can transmit?

A

2048 bytes.

27
Q

What are some uses of RFID?

A

Animal identification, inventory management, retail tracking, automated toll collection.

28
Q

What are some RFID vulnerabilities?

A

Fake tags, data theft, undermining data integrity.

29
Q

What are defenses against RFID attacks?

A

Encryption, secure protocols, physical security.

30
Q

What common items contain embedded RFID chips?

A

Contactless credit cards, passports, hotel key cards, Enhanced Driver’s License (EDL).

31
Q

How do RFID passports work?

A

Embedded in the front cover and must be open to transmit information.

32
Q

What security measure makes it harder to steal passport RFID data?

A

The passport must be open for transmission, requiring attackers to steal the entire passport.

33
Q

What is an Enhanced Driver’s License (EDL), and how does it use RFID?

A

Some states and border crossings use EDLs; biometric data is retrieved when an RFID signal is sent.

34
Q

What information is stored on a hotel key card?

A

Dates of stay, room number, and authorized guests.

35
Q

What type of RFID do hotel key cards use?

A

Low-frequency (LF) RFID.

36
Q

Why is it difficult for attackers to steal RFID data from hotel key cards?

A

Short-range LF RFID limits the effectiveness of data theft.

37
Q

What frequency does RFID blocking technology target?

A

13.56 MHz.

38
Q

What type of RFID signals do RFID-blocking wallets block?

A

Low-frequency signals such as hotel room cards, building access cards, and ID badges.