1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What are three short-range wireless communication technologies besides Wi-Fi?
Bluetooth, RFID, NFC
What is Bluetooth used for?
Sharing data between two devices within a short range (personal area network or PAN)
What is the process of connecting two Bluetooth devices called?
Pairing
In a Bluetooth connection, what role does the phone usually play?
Server (central device)
In a Bluetooth connection, what role do headphones usually play?
Client (peripheral device)
What does "discoverable mode" mean in Bluetooth?
The device can be seen by other nearby Bluetooth devices
What is exchanged during Bluetooth pairing for security?
A security passkey (user-created or pre-programmed)
What Bluetooth protocol is used for pairing and data exchange?
OBject EXchange (OBEX)
Do paired Bluetooth devices need to repeat the pairing process every time?
No, they remember each other
What is the latest Bluetooth version mentioned?
5.3
Are Bluetooth versions backwards compatible?
Yes
What does RFID stand for?
Radio Frequency Identification
What does RFID use to transmit data?
Radio waves
What are RFID tags?
Small circuit boards that transmit data to scanners
What is the difference between active and passive RFID tags?
Active tags have onboard batteries (longer range); Passive tags rely on scanner power (shorter range)
Give examples of RFID uses.
Toll passes, ID badges, credit cards, retail security tags, package tracking
What is a major security risk of RFID?
Attackers can scan, clone, or eavesdrop on RFID tags
How do RFID chips mitigate attacks?
Operate at different frequencies and require close proximity
What does NFC stand for?
Near Field Communication
How close must NFC devices be to communicate?
Within a few centimeters
What is NFC commonly used for?
Mobile payments, file transfer between phones, e-passports
How is NFC related to RFID?
NFC is built on RFID technology
What is NFC vulnerable to?
Same attacks as RFID, but attacker must be extremely close