Matching
Match each term with the correct statement below.
Premises:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Responses:
near field communication
bluesnarfing
ZigBee
VLC
passive RFID tag
free space optics
bluejacking
MBSN
Fixed WiMAX
ABSN
Correct Answer:
Premises:
Responses:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Premises:
an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal
a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician
a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body
an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source
an optical,wireless,point-to-point,line-of-sight wireless technology for outdoor transmissions
a low-power,short-range,and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration,security and other higher-level features
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection
a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings
an attack that sends unsolicited messages to Bluetooth-enabled devices
set of standards primarily for smartphones and smart cards that is used to establish communication between devices
Responses:
Related Questions
Q27: Which of the following is NOT true
Q28: A Bluetooth device in _ mode is
Q29: Which technology is most likely found in
Q30: List and describe the two different types
Q31: Which of the following is NOT true
Q33: What type of RFID tag operates at
Q34: What type of wireless network is used
Q35: Which of the following are Bluetooth piconet
Q36: Which of the following are advantages of
Q37: Which technology is most likely found in