Connection Types Flashcards

(34 cards)

1
Q

What does NFC stand for?

A

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the maximum distance communicated across by NFC?

A

About 4 inches (10 cm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three applications for NFC

A

Contactless payment
Electronic ticketing
Data transfer between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NFC operates at what frequency?

A

13.56 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the names given to the two devices’ roles in an NFC communication?

A

Initiator device
Target device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why doesn’t NFC require encryption?

A

To maintain backwards compatibility with RFID tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two communication modes in NFC?

A

Active & passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does active mode differ from passive mode in NFC communication?

A

Passive: only one device is powered
Active: both devices are powered and alternate generating fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum data transfer speed of NFC?

A

424 kbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does NFC compare to Bluetooth in terms of speed and range?

A

NFC is slower (max 424 kbit/s) and has a shorter range (20 cm) compared to Bluetooth (up to 2.1 Mbit/s and 100 m range).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three NFC operation modes?

A

Peer-to-peer mode, reader/writer mode, and card emulation mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of NFC tag is commonly used for transit and event tickets?

A

Type 2 NFC tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who introduced Bluetooth technology and when?

A

Ericsson, a Swedish telecommunications company, introduced Bluetooth in 1994 as a way to replace RS-232 cables with short-range wireless communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What frequency range does Bluetooth operate in?

A

Bluetooth operates in the Industrial, Scientific, and Medical (ISM) band at 2.4 GHz to 2.48 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Bluetooth establish a connection between devices?

A

Bluetooth devices use radio waves to detect each other, perform a pairing process, and then create a secure, encrypted communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the different Bluetooth power classes and their ranges?

A

Class 1: Up to 100 meters (used in industrial applications).
Class 2: Up to 10 meters (most common for smartphones, headphones, etc.).
Class 3: Up to 1 meter (rarely used due to its short range).

17
Q

How does Bluetooth 5.0 improve upon previous versions?

A

Bluetooth 5.0 offers 4x the range, 2x the speed, and 8x the broadcast capacity compared to Bluetooth 4.0, with lower energy consumption.

18
Q

What is Bluetooth Low Energy (BLE), and why is it important?

A

BLE is a low-power version of Bluetooth designed for IoT, fitness trackers, and smart home devices that need long battery life.

19
Q

What is Bluetooth Mesh, and how does it work?

A

Bluetooth Mesh enables many devices to form a self-healing, decentralized network, useful in smart cities, industrial automation, and IoT.

20
Q

How does Bluetooth avoid interference with Wi-Fi and other wireless signals?

A

Bluetooth uses Adaptive Frequency Hopping (AFH), which switches between 79 channels in the 2.4 GHz band to minimize interference.

21
Q

How does frequency hopping help Bluetooth security?

A

Bluetooth switches frequencies 1,600 times per second, making it difficult for attackers to intercept communications.

22
Q

Bluesnarfing

A

Bluesnarfing occurs when an attacker exploits a Bluetooth vulnerability to steal files, messages, or contacts from a victim’s device.

23
Q

Bluejacking

A

Bluejacking is the sending of unsolicited messages (like spam) to nearby Bluetooth devices. It’s annoying but not harmful like hacking.

24
Q

Bluebugging

A

Bluebugging allows hackers to gain full control over a Bluetooth-enabled device, letting them eavesdrop, make calls, and send messages.

25
How does a Man-in-the-Middle (MITM) attack work in Bluetooth?
In a MITM attack, a hacker intercepts and possibly alters data being exchanged between two Bluetooth devices.
26
BlueSmacking
BlueSmacking is a Denial of Service (DoS) attack where an attacker sends oversized data packets, causing the target device to crash.
27
Car Whispering
Car Whispering is when hackers exploit car Bluetooth systems to listen in on conversations or inject fake audio.
28
BLURtooth
BLURtooth allows attackers to bypass authentication, potentially gaining unauthorized access to Bluetooth devices.
29
KNOB (Key Negotiation of Bluetooth)
KNOB forces a downgrade attack, reducing Bluetooth encryption strength so hackers can eavesdrop and manipulate data.
30
BLESA (Bluetooth Low Energy Spoofing Attack)
BLESA exploits weak authentication in Bluetooth Low Energy, allowing attackers to inject malicious data during reconnection.
31
How is Bluetooth used in smart home applications?
Bluetooth connects smart locks, lighting, thermostats, speakers, and security systems to automate homes.
32
How does Bluetooth assist IoT (Internet of Things) devices?
BLE enables low-power connectivity for IoT devices like smart sensors, fitness trackers, and industrial equipment.
33
What are some benefits of Bluetooth technology?
Low power consumption Wireless convenience (no cables) Secure communication with encryption Compatibility with a wide range of devices Fast and easy pairing
34
What are some limitations of Bluetooth?
Short range (compared to Wi-Fi) Limited bandwidth (not suitable for high-speed data transfer) Vulnerabilities to cyber-attacks Potential battery drain on mobile devices