Module 10 Flashcards
(38 cards)
What are the most widely used wireless networks?
Cellular networks, operated by telecom service providers.
What is the purpose of fixed wireless networks?
To provide internet access to areas with no wired infrastructure.
Who owns, manages, and charges for cellular networks?
Telecom providers.
What type of wireless technology uses radio frequency transmission?
Bluetooth.
What are some categories of Bluetooth use?
Automotive, Personal, Home Entertainment, Computer, Sports & Fitness, Health.
What are some examples of Bluetooth devices?
Hands-free system, wireless headphones, smart door locks, wireless keyboards, heart rate monitors, blood pressure monitors.
What are some common Bluetooth usage scenarios?
Browsing phone, creating playlists, controlling door locks remotely, monitoring heart rate and sleep, sampling data for analysis.
What is the latest Bluetooth version as of 2023?
Bluetooth 5.4.
What is Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) used for?
Sharing range with continuous connectivity.
What is the data rate for Bluetooth Low Energy (LE)?
1 Mbps, 2 Mbps, 3 Mbps.
What are the ranges for Bluetooth connectivity?
130 ft (40m), 260 ft (80m), 400 ft (120m).
What factors affect Bluetooth network topology?
Distance, transmission power, and antenna gain.
What are the roles in Bluetooth network topology?
Broadcaster, Observer, Follower (active and inactive).
What are the two types of Bluetooth network topology?
Point-to-point and point-to-multipoint.
What additional topology does Bluetooth LE support?
Many-to-many or mesh networks, which may extend the network range.
What is a scatternet?
A network of piconets, rarely used.
What is Bluejacking?
An attack that sends messages (text, sound, images) to Bluetooth devices, considered annoying but not harmful.
What is Bluesnarfing?
An attack that accesses and copies information through a Bluetooth connection.
What is Near Field Communication (NFC)?
A communication protocol allowing two electronic devices to communicate over 4 cm or less.
What are the roles in NFC communication?
Initiator (actively generates RF field) and Target (can be powered passively).
What are examples of NFC usage?
Wireless payments, public transport payment systems, computer setup.
What are NFC vulnerabilities?
Eavesdropping, data theft, MITM attacks, device theft.
What are defenses against NFC attacks?
Limiting range, encryption, secure elements, authentication.
What is Radio Frequency Identification (RFID)?
The use of radio waves to read and capture information from a tag attached to an object.