WIRELESS DAY 2 Flashcards

1
Q

Bluetooth devices advertise their BD_ADDR and device name when operating in what mode of operation?

A

Discoverable Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What allows Classic Bluetooth devices to alter their hopping sequences to avoid channels with interference?

A

Adaptive Frequency Hopping (AFH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the max transmit power and typical range for Power Class 1 interfaces?

A

100 mW and 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Bluetooth discovery method of Traffic Analysis attempts to read the 24-bit Lower Address Part (LAP) out of the _____ _____ and reverse engineer the 8-bit Upper Address Part (UAP) from the ________.

A

Sync Word and Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the max transmit power and typical range for Power Class 1.5 interfaces?

A

10 mW and 20 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the hopping rate for Classic Bluetooth operations?

A

1600 hops per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Bluetooth discovery method attempts to guess the BD_ADDR as being “off-by-one” from the Wi-Fi MAC address of the same device?

A

Hybrid Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which portion of the Classic Bluetooth protocol stack is software-based, user-accessible, and is where profiles can be found?

A

Host Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the max transmit power and typical range for Power Class 2 interfaces?

A

2.5 mW and 10 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum data rate for Bluetooth Classic?

A

3 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What defines security mechanisms and various applications for various Bluetooth uses?

A

Bluetooth Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Bluetooth protocol can be used to enumerate what services are available on a potential target device?

A

Service Discovery Protocol (SDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three parts of the BD_ADDR?

A

Non-significant Address Part (NAP), Upper Address Part (UAP), Lower Address Part (LAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which portion of the Classic Bluetooth protocol stack is hardware-based, not user-accessible, and where encryption is implemented?

A

Controller Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On a Classic Bluetooth protocol stack, what is the interface called between the user-accessible protocols implemented on the Bluetooth host and the typically inaccessible protocols implemented on the Bluetooth controller?

A

Host Controller Interface (HCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classic Bluetooth uses FHSS modulation to hop across how many frequencies?

A

79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In what frequency range does Classic Bluetooth operate?

A

2.4 GHz ISM Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the max transmit power and typical range for Power Class 3 interfaces?

A

1 mW and 1 meter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In what frequency band does BLE operate?

A

2.4 GHz ISM Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What optional privacy feature is available for BLE devices?

A

Randomly generated BD_ADDR for each connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

On how many channels/frequencies does BLE networks hop?

A

40 total: 37 data channels and 3 advertising channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What marketing term describes devices capable of operating in both Classic Bluetooth and BLE?

A

Bluetooth Smart Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

For Bluetooth Low Energy 4.0

Max Data Rate: ____

Typical Max Range: ____

Max Payload Size: ___

A

1 Mbps

10 meters

39 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For Bluetooth Low Energy 5.0

Max Data Rate: ____

Typical Max Range: ____

Max Payload Size: ___

A

2 Mbps

40 meters

257 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What marketing term describes devices capable of operating in BLE only?

A

Bluetooth Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many devices can participate in a piconet?

A

Maximum of 8 total devices. 1 Master device and up to 7 Slave devices.

27
Q

What architecture does a Bluetooth piconet use?

A

Master-Slave structure formed in an ad hoc fashion

28
Q

What is the key value used to generate the pseudorandom hopping sequence?

A

MAC Address of the Master device

29
Q

What 3 components are required to create a Classic Bluetooth Security (Link) Key?

Which part(s) is/are sent during the pairing process?

A

BD_ADDR, PIN value, and some Random Numbers

Only the Random numbers are sent during the pairing process.

  • The PIN is never transmitted
  • The BD_ADDR is only transmitted when in Discoverable mode
30
Q

What is the term used to describe changing a Bluetooth interface’s name, service class, and/or BD_ADDR in order to bypass connection restrictions?

A

Device Identity Manipulation

31
Q

What makes intercepting Bluetooth traffic difficult?

A
  1. Use of FHSS modulation
    - Unique and long hopping pattern
    - Pattern may have been altered due to AFH
  2. Standard Bluetooth interfaces do not support “monitor-mode” passive sniffing
32
Q

What is the term used to describe taking advantages of vulnerabilities of Bluetooth Profiles after establishing a connection to a target device?

A

Abusing Profiles

33
Q

What attack attempts to invalidate legitimate Security Keys to create an opportunity for an attacker to capture a new “initial” pairing?

A

Repairing attack

34
Q

What are the 3 types of ZigBee devices?

A

ZigBee Coordinator (ZC)

ZigBee Router (ZR)

ZigBee End Device (ZED)

35
Q

What network topologies are supported in ZigBee networks?

A

Tree, Star, or Mesh

36
Q

What open standard is used by ZigBee devices at Layers 1 & 2?

A

IEEE 802.15.4

37
Q

What is the most common frequency range for ZigBee networks?

A

2.4 GHz ISM band

38
Q

What is the typical max range of transmission for ZigBee devices?

A

10 to 20 meters

39
Q

What is the max data rate for ZigBee communications?

A

250 Kbps

40
Q

What is the maximum number of devices in a ZigBee network?

A

65,535

41
Q

What are the two ZigBee security modes?

Which is more secure?

A

High Security and Standard

High Security is more secure

42
Q

What are the two security models?

Which is more secure?

A

Centralized and Distributed

Centralized is more secure

43
Q

What frequency range does Z-Wave networks operate?

A

Sub-1 GHz (865 - 926 MHz)

44
Q

What is the max data rate for Z-Wave transmissions?

A

100 Kbps

45
Q

What network topologies are supported by Z-Wave networks?

A

Mesh

46
Q

What open standard do Z-Wave devices use at Layers 1 & 2?

A

ITU-T Recommendation G.9959

47
Q

What is the maximum number of devices on Z-Wave networks?

A

232

48
Q

What is the biggest security threat to Z-Wave operations?

A

Lack of use of the optional encryption

49
Q

What are the different types of RFID tags?

A

Active - has own power source

Passive - powered through inductive coupling of the magnetic field from the reader

50
Q

What are the three major components of an RFID system?

A
  1. Reader/Interrogator
  2. Antenna
  3. Tag
51
Q

In how many frequency ranges can RFID operate?

A

3 different frequency ranges (LF, HF, and UHF)

52
Q

What is the biggest security concern with RFID?

A

“Skimming” and duplication of RFID tags

53
Q

What are the two types of Active Tags?

A
  1. Transponder - transmits when interrogated

2. Beacon - transmits on a periodic basis

54
Q

What is the max range of operation for RFID systems?

A

approximately 300 feet

55
Q

What is the frequency of operation for NFC devices?

A

13.56 MHz

56
Q

What is the typical range of transmission for NFC?

A

less than 4 centimeters

57
Q

What are the components of an NFC system?

A
  1. Initiator

2. Target

58
Q

What is the max data rate of transmission for NFC?

A

424 Kbps

59
Q

What are the 3 NFC modes of operation?

A
  1. Card Emulation
  2. Discovery (read & write)
  3. Peer-to-peer communications
60
Q

What are the communication modes supported by NFC?

A

Simplex (one-way)

Half-Duples (two-way)

Full-Duplex (two-way)

61
Q

What is the term used to describe using malicious code embedded in QR codes to execute malware on a victim device?

A

Attack Tagging or “attaggin”

62
Q

A typical QR code can store how many alphanumeric characters?

A

appx. 4000 (4296)

63
Q

A typical QR code can store how many numeric characters?

A

appx. 7000 (7,089)