• +91 9723535972
  • info@interviewmaterial.com

BlueTooth Interview Questions and Answers

BlueTooth Interview Questions and Answers

Question - 11 : - Which method is used for Data transfer?

Answer - 11 : - Asynchronous Connectionless (ACL) is Data transfer method in Bluetooth

Question - 12 : - Which technology is used in Bluetooth for avoiding interference?

Answer - 12 : - Frequency hopping is the technology used in Bluetooth.

Question - 13 : - How does Bluetooth use frequency hopping for security?

Answer - 13 : - Bluetooth picks a random frequency out of 79 and then hops around the range about 1600 times per second.

Question - 14 : - How many SCO links are there in a piconet?

Answer - 14 : - In a piconet, there can be up to three SCO links of 64,000 bits per second each.

Question - 15 : - Give a generic description of Bluetooth?

Answer - 15 : - Bluetooth is a low-cost, short-range (RF) links between mobile PCs, mobile phones and other portable devices. Bluetooth can transmit through solid, non-metal objects.

Question - 16 : - Which Bluetooth version uses adaptive frequency hopping? Why?

Answer - 16 : - In Version 1.2 Adaptive frequency hopping method is used, which improves resistance to radio interference, and provides higher transmission speed.

Question - 17 : - What are the other (competing or not) wireless technologies?

Answer - 17 : - Wi-Fi, IrDa, EDGE, UWB (Ultra Wide Band)

Question - 18 : - About Bluetooth 4.0

Answer - 18 : - A new version of the Bluetooth wireless device-to-device technology that offers significantly lower power consumption than previous versions. Also referred to as Bluetooth Low Energy, Bluetooth 4.0 achieves its reduced power consumption by enabling devices to remain paired, or connected to each other, without requiring a continual stream of data to be transferred between the devices.

Question - 19 : - Define IP Spoofing?

Answer - 19 : - Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a trusted host, for gaining unauthorized access to computer systems. The hacker/intruder first utilize a variety of techniques for finding an IP address of a trusted host. Later he modifies the packet headers, in order to give an illusion that the packets are sent from the host.

Question - 20 : - Define Cabir Worm?

Answer - 20 : -

Cabir worm is one of the malicious software, usually referred as malware. It utilizes Bluetooth technology for sending itself to another similarly vulnerable device. As it is self-replicative, is it classified as a worm.
Cabir worms are currently affects mobile phone which uses the Symbian Series 60 User Interface Platform and feature Bluetooth wireless technology.


NCERT Solutions

 

Share your email for latest updates

Name:
Email:

Our partners