Ch. 9 Wireless Network Security pt. 1

Ace your homework & exams now with Quizwiz!

what are the 2 slaves in a piconet?

1. active slave 2. parked slave

What are the two bluetooth attacks?

1. bluejacking 2. bluesnarfing

What are the two types of bluetooth network topologies

1. piconet 2. scatternet

____% of U.S. households use wireless data technology

61

t or f in a piconet, a master may have multiple slaves

True

When discussing risk, what are the 5 options?

acceptance avoidance transference mitigation deterrence

Slave devices that are connected to the piconet and are sending transmissions are known as..

active slaves

_______________ is an attack that sends unsolicited messages to bluetooth enabled devices

bluejacking

In a _______ attack, the attacker copies emails, calenders, contact lists, cell phone pictures, or videos by connecting to the bluetooth device without the owner's knowledge or permission

bluesnarfing

______________ is an attack that accesses unauthorized information from a wireless device through a bluetooth connection, often between cell phones and laptop computers

bluesnarfing

___________ is the name given to a wireless technology that uses short-range radio frequency transmissions and provides rapid ad hoc or "on-the-fly" device pairings

bluetooth

NFC devices are increasingly used in ___________ in which a consumer can pay for a purchase by simply tapping a store's payment terminal with their smartphone

contactless payment systems

If a bluetooth device is ________, everyone around with bluetooth enabled will be able to see the device

discoverable

For bluetooth to be a PAN (personal area network) means that it must be in.....

fairly close range

t or f if multiple piconets cover the same area, a bluetooth device cannot be a member in two or more overlaying piconets

false

What is the difference between a piconet and a scatternet?

in a scatternet, an active slave may belong to two masters at one time

The device that is controlling all of the wireless traffic in a piconet is called the

master

When using ________, once the devices are either tapped together or brought within several centimeters of each other, two-way communication is established

near field communication (NFC)

____________ is a set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity

near field communication (NFC)

Can risk be reasonably eliminated?

no

is data stolen in a bluejacking attack?

no

Slave devices that are connected but are not actively participating are called..

parked slaves

A _______ technology is designed for data communications over short distances

personal area network (PAN)

Bluetooth is a ____ technology designed for data communication over short distances

personal area network (PAN)

piconet and scatternet are examples of a ..

personal area network (PAN)

When using a __________ topology, one bluetooth device is a master, controlling all wireless traffic, while the other device is a slave and takes commands from the master

piconet

a group of piconets in which connections exist between different piconets is called a

scatternet

usually bluejacking involves....

sending text messages, images, and sounds

The device that is taking the commands from the master in a piconet is called the

slave

A ____________ is designed to replace or supplement a wired local area network (LAN)

wireless local area network (WLAN)

Do people need to be close to you in order to carry out a bluetooth attack?

yes

Is data being stolen in a bluesnarfing attack?

yes

what does IEEE stand for?

Institute of Electrical and Electronics Engineers

Which country is number one in percentage of households using wireless data technology?

South Korea (with 80%)

Is the range of NFC or bluetooth smaller?

the range of the near field communication (NFC) is less than the range of bluetooth

t or f NFC is a low speed and power technology

true

t or f bluejacking has been used for advertising purposes by vendors

true

t or f bluejacking is usually considered more annoying than harmful because no data is stolen

true

t or f bluetooth technology enables users to connect wirelessly to a wide range of computing and telecommunications devices

true

t or f with exceptions of Apple, every major cell phone manufacturer has announced plans to incorporate NFC into its smartphone devices

true

How can you prevent bluesnarfing?

turn off bluetooth devices when not being used or in a room with unknown people. Another option is to set the bluetooth on the device to undiscoverable


Related study sets

Midterm Study concepts. chap 1-14

View Set

RHIA (Domain I) Data Content Structure and Standards

View Set

Marketing Chapter 5 (Test Bank Questions)

View Set

Hunter Safety Chapter 6-9 Lucieo E.

View Set

Anatomy- Female Internal Genitalia

View Set