WIRELESS DAY 2 Flashcards

(63 cards)

1
Q

Bluetooth devices advertise their BD_ADDR and device name when operating in what mode of operation?

A

Discoverable Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What allows Classic Bluetooth devices to alter their hopping sequences to avoid channels with interference?

A

Adaptive Frequency Hopping (AFH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the max transmit power and typical range for Power Class 1 interfaces?

A

100 mW and 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Bluetooth discovery method of Traffic Analysis attempts to read the 24-bit Lower Address Part (LAP) out of the _____ _____ and reverse engineer the 8-bit Upper Address Part (UAP) from the ________.

A

Sync Word and Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the max transmit power and typical range for Power Class 1.5 interfaces?

A

10 mW and 20 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the hopping rate for Classic Bluetooth operations?

A

1600 hops per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Bluetooth discovery method attempts to guess the BD_ADDR as being “off-by-one” from the Wi-Fi MAC address of the same device?

A

Hybrid Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which portion of the Classic Bluetooth protocol stack is software-based, user-accessible, and is where profiles can be found?

A

Host Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the max transmit power and typical range for Power Class 2 interfaces?

A

2.5 mW and 10 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum data rate for Bluetooth Classic?

A

3 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What defines security mechanisms and various applications for various Bluetooth uses?

A

Bluetooth Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Bluetooth protocol can be used to enumerate what services are available on a potential target device?

A

Service Discovery Protocol (SDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three parts of the BD_ADDR?

A

Non-significant Address Part (NAP), Upper Address Part (UAP), Lower Address Part (LAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which portion of the Classic Bluetooth protocol stack is hardware-based, not user-accessible, and where encryption is implemented?

A

Controller Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On a Classic Bluetooth protocol stack, what is the interface called between the user-accessible protocols implemented on the Bluetooth host and the typically inaccessible protocols implemented on the Bluetooth controller?

A

Host Controller Interface (HCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classic Bluetooth uses FHSS modulation to hop across how many frequencies?

A

79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In what frequency range does Classic Bluetooth operate?

A

2.4 GHz ISM Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the max transmit power and typical range for Power Class 3 interfaces?

A

1 mW and 1 meter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In what frequency band does BLE operate?

A

2.4 GHz ISM Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What optional privacy feature is available for BLE devices?

A

Randomly generated BD_ADDR for each connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

On how many channels/frequencies does BLE networks hop?

A

40 total: 37 data channels and 3 advertising channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What marketing term describes devices capable of operating in both Classic Bluetooth and BLE?

A

Bluetooth Smart Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

For Bluetooth Low Energy 4.0

Max Data Rate: ____

Typical Max Range: ____

Max Payload Size: ___

A

1 Mbps

10 meters

39 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For Bluetooth Low Energy 5.0

Max Data Rate: ____

Typical Max Range: ____

Max Payload Size: ___

A

2 Mbps

40 meters

257 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What marketing term describes devices capable of operating in BLE only?
Bluetooth Smart
26
How many devices can participate in a piconet?
Maximum of 8 total devices. 1 Master device and up to 7 Slave devices.
27
What architecture does a Bluetooth piconet use?
Master-Slave structure formed in an ad hoc fashion
28
What is the key value used to generate the pseudorandom hopping sequence?
MAC Address of the Master device
29
What 3 components are required to create a Classic Bluetooth Security (Link) Key? Which part(s) is/are sent during the pairing process?
BD_ADDR, PIN value, and some Random Numbers Only the Random numbers are sent during the pairing process. - The PIN is never transmitted - The BD_ADDR is only transmitted when in Discoverable mode
30
What is the term used to describe changing a Bluetooth interface's name, service class, and/or BD_ADDR in order to bypass connection restrictions?
Device Identity Manipulation
31
What makes intercepting Bluetooth traffic difficult?
1. Use of FHSS modulation - Unique and long hopping pattern - Pattern may have been altered due to AFH 2. Standard Bluetooth interfaces do not support "monitor-mode" passive sniffing
32
What is the term used to describe taking advantages of vulnerabilities of Bluetooth Profiles after establishing a connection to a target device?
Abusing Profiles
33
What attack attempts to invalidate legitimate Security Keys to create an opportunity for an attacker to capture a new "initial" pairing?
Repairing attack
34
What are the 3 types of ZigBee devices?
ZigBee Coordinator (ZC) ZigBee Router (ZR) ZigBee End Device (ZED)
35
What network topologies are supported in ZigBee networks?
Tree, Star, or Mesh
36
What open standard is used by ZigBee devices at Layers 1 & 2?
IEEE 802.15.4
37
What is the most common frequency range for ZigBee networks?
2.4 GHz ISM band
38
What is the typical max range of transmission for ZigBee devices?
10 to 20 meters
39
What is the max data rate for ZigBee communications?
250 Kbps
40
What is the maximum number of devices in a ZigBee network?
65,535
41
What are the two ZigBee security modes? Which is more secure?
High Security and Standard High Security is more secure
42
What are the two security models? Which is more secure?
Centralized and Distributed Centralized is more secure
43
What frequency range does Z-Wave networks operate?
Sub-1 GHz (865 - 926 MHz)
44
What is the max data rate for Z-Wave transmissions?
100 Kbps
45
What network topologies are supported by Z-Wave networks?
Mesh
46
What open standard do Z-Wave devices use at Layers 1 & 2?
ITU-T Recommendation G.9959
47
What is the maximum number of devices on Z-Wave networks?
232
48
What is the biggest security threat to Z-Wave operations?
Lack of use of the optional encryption
49
What are the different types of RFID tags?
Active - has own power source Passive - powered through inductive coupling of the magnetic field from the reader
50
What are the three major components of an RFID system?
1. Reader/Interrogator 2. Antenna 3. Tag
51
In how many frequency ranges can RFID operate?
3 different frequency ranges (LF, HF, and UHF)
52
What is the biggest security concern with RFID?
"Skimming" and duplication of RFID tags
53
What are the two types of Active Tags?
1. Transponder - transmits when interrogated | 2. Beacon - transmits on a periodic basis
54
What is the max range of operation for RFID systems?
approximately 300 feet
55
What is the frequency of operation for NFC devices?
13.56 MHz
56
What is the typical range of transmission for NFC?
less than 4 centimeters
57
What are the components of an NFC system?
1. Initiator | 2. Target
58
What is the max data rate of transmission for NFC?
424 Kbps
59
What are the 3 NFC modes of operation?
1. Card Emulation 2. Discovery (read & write) 3. Peer-to-peer communications
60
What are the communication modes supported by NFC?
Simplex (one-way) Half-Duples (two-way) Full-Duplex (two-way)
61
What is the term used to describe using malicious code embedded in QR codes to execute malware on a victim device?
Attack Tagging or "attaggin"
62
A typical QR code can store how many alphanumeric characters?
appx. 4000 (4296)
63
A typical QR code can store how many numeric characters?
appx. 7000 (7,089)