Ch. 9 Wireless Network Security pt. 1
what are the 2 slaves in a piconet?
1. active slave 2. parked slave
What are the two bluetooth attacks?
1. bluejacking 2. bluesnarfing
What are the two types of bluetooth network topologies
1. piconet 2. scatternet
____% of U.S. households use wireless data technology
61
t or f in a piconet, a master may have multiple slaves
True
When discussing risk, what are the 5 options?
acceptance avoidance transference mitigation deterrence
Slave devices that are connected to the piconet and are sending transmissions are known as..
active slaves
_______________ is an attack that sends unsolicited messages to bluetooth enabled devices
bluejacking
In a _______ attack, the attacker copies emails, calenders, contact lists, cell phone pictures, or videos by connecting to the bluetooth device without the owner's knowledge or permission
bluesnarfing
______________ is an attack that accesses unauthorized information from a wireless device through a bluetooth connection, often between cell phones and laptop computers
bluesnarfing
___________ is the name given to a wireless technology that uses short-range radio frequency transmissions and provides rapid ad hoc or "on-the-fly" device pairings
bluetooth
NFC devices are increasingly used in ___________ in which a consumer can pay for a purchase by simply tapping a store's payment terminal with their smartphone
contactless payment systems
If a bluetooth device is ________, everyone around with bluetooth enabled will be able to see the device
discoverable
For bluetooth to be a PAN (personal area network) means that it must be in.....
fairly close range
t or f if multiple piconets cover the same area, a bluetooth device cannot be a member in two or more overlaying piconets
false
What is the difference between a piconet and a scatternet?
in a scatternet, an active slave may belong to two masters at one time
The device that is controlling all of the wireless traffic in a piconet is called the
master
When using ________, once the devices are either tapped together or brought within several centimeters of each other, two-way communication is established
near field communication (NFC)
____________ is a set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
near field communication (NFC)
Can risk be reasonably eliminated?
no
is data stolen in a bluejacking attack?
no
Slave devices that are connected but are not actively participating are called..
parked slaves
A _______ technology is designed for data communications over short distances
personal area network (PAN)
Bluetooth is a ____ technology designed for data communication over short distances
personal area network (PAN)
piconet and scatternet are examples of a ..
personal area network (PAN)
When using a __________ topology, one bluetooth device is a master, controlling all wireless traffic, while the other device is a slave and takes commands from the master
piconet
a group of piconets in which connections exist between different piconets is called a
scatternet
usually bluejacking involves....
sending text messages, images, and sounds
The device that is taking the commands from the master in a piconet is called the
slave
A ____________ is designed to replace or supplement a wired local area network (LAN)
wireless local area network (WLAN)
Do people need to be close to you in order to carry out a bluetooth attack?
yes
Is data being stolen in a bluesnarfing attack?
yes
what does IEEE stand for?
Institute of Electrical and Electronics Engineers
Which country is number one in percentage of households using wireless data technology?
South Korea (with 80%)
Is the range of NFC or bluetooth smaller?
the range of the near field communication (NFC) is less than the range of bluetooth
t or f NFC is a low speed and power technology
true
t or f bluejacking has been used for advertising purposes by vendors
true
t or f bluejacking is usually considered more annoying than harmful because no data is stolen
true
t or f bluetooth technology enables users to connect wirelessly to a wide range of computing and telecommunications devices
true
t or f with exceptions of Apple, every major cell phone manufacturer has announced plans to incorporate NFC into its smartphone devices
true
How can you prevent bluesnarfing?
turn off bluetooth devices when not being used or in a room with unknown people. Another option is to set the bluetooth on the device to undiscoverable