Tech 'n' Tech Books

Bluetooth Interview Questions

Top Bluetooth interview questions

  1. Why is Bluetooth called a cable replacement technology?
  2. Give a generic description of Bluetooth?
  3. Why can Bluetooth equipment integrate easily in TCP/IP network?
  4. Is it possible to connect multiple Bluetooth hubs?
  5. What is FCC and how does it relate to Bluetooth?
  6. Under what frequency range does Bluetooth work?
  7. Do Bluetooth devices need line of sight to connect to one another?
  8. Which technology is used in Bluetooth for avoiding interference?
  9. What is Airport?
  10. What is Piconet?
  11. What is FEC in Bluetooth?
  12. Which method is primarily used for Voice transfer?
  13. What is the frequency range used for Bluetooth in Europe and United States?
  14. List some Technology characteristic of Bluetooth?
  15. Which company originally conceived and developed Bluetooth?
  16. How does Bluetooth use frequency hopping for security?
  17. What is a Bluetooth dongle?
  18. What are the other (competing or not) wireless technologies?
  19. Which Bluetooth version uses adaptive frequency hopping? Why?
  20. How many SCO links are there in a piconet?
  21. what is the total number of masters and slaves in a piconet?
  22. Which method is used for Data transfer?
  23. What is the frequency range used for Bluetooth in Japan?
  24. What is the strength of the signal transmitted by powerful cell phones?
  25. What is RJ-45 and full name of RJ-45?
  26. What is LDAP? Where all can it be used
  27. Difference between TCP and UDP
  28. What is 802.11b, Bluetooth
  29. What types of routing are possible in a wireless network
  30. How does traceroute work
  31. What are the different types of routing possible at layer 3
  32. Explain TCP connection establishment and tear down
  33. What is ICMP, ARP, Multicast, Broadcast
  34. When are packets passed from TCP layer to application layer? What if some IP packets are lost
  35. Describe TCP flow control
  36. Explain DNS, IP address allocation
  37. What is IP Spoofing? What do hackers do with it
  38. What is DOS attack
  39. Explain SSL
  40. How can you keep a TCP connection from tearing down when no data will be sent for a long time?