COMPUTER THREATS SECURITY
WHAT IS A FIREWALL IN NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
BlueSnarfing
|
|
BlueJacking
|
|
Bluesmacking
|
|
Bluequery
|
Detailed explanation-1: -The security of Bluetooth uses the concept of two separate keys, an authentication key and an encryption key. The authentication key is the master key, and encryption keys are regenerated with each new session. A random number, generated for each transaction, adds additional security.
Detailed explanation-2: -One of the techniques Bluetooth technology uses to overcome interference and find a clear transmission path that avoids packet collision is the application of a form of frequency-hopping spread spectrum (FHSS) called adaptive frequency hopping (AFH).
Detailed explanation-3: -Bluetooth device looks for other Bluetooth devices in range: To be found by other Bluetooth devices, the first device, Device 1 must be set to discoverable mode-this will allow other Bluetooth devices in the vicinity to detect its presence and attempt to establish a connection.
Detailed explanation-4: -Paging (Connecting)–Paging is the process of forming a connection between two Bluetooth devices. Before this connection can be initiated, each device needs to know the address of the other (found in the inquiry process).