Question
Which of the following is NOT security challenge to GSM cellular network? Question 1 options: Designed with little security Lack of user visibility Vulnerability to
Which of the following is NOT security challenge to GSM cellular network?
Question 1 options:
Designed with little security | |
Lack of user visibility | |
Vulnerability to the DoS attack | |
Flaws in cryptographic algorithms |
Save
Question 2 (1 point)
GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators
Question 2 options:
Ture | |
false |
Save
Question 3 (1 point)
GSM standard has no provision for the integrity protection of the informaiton.
Question 3 options:
True | |
false |
Save
Question 4 (1 point)
The _______ represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.
Question 4 options:
network access security | |
network domain security | |
application domain security | |
visibility and configurability of the security |
Save
Question 5 (1 point)
The first generation of celluar networks were designed with very little security.
Question 5 options:
Ture | |
False |
Save
Question 6 (1 point)
Which of following is (are) security improvement of 3G network comparing to GSM network?
Question 6 options:
The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC | |
The cryptographic keys derived on the User Services Identity Module (USIM) are longer | |
Protection of the signaling infrastructure in the core network | |
All of above |
Save
Question 7 (1 point)
The ______ cellular network requires the use of USIM and exculding the GSM SIM
Question 7 options:
1G | |
2G (GSM) | |
3G (UMTS) | |
4G LTE |
Save
Question 8 (1 point)
The _________ represents the set of security features that enable nodes to securely exchange signaling data, user data, and protect against attacks on the wire-line network.
Question 8 options:
network access security | |
network domain security | |
user domain security | |
application domain security |
Save
Question 9 (1 point)
In a GSM network, the subscriber authentication is done through _________ algorithm.
Question 9 options:
A1 | |
A3 | |
A5 | |
A8 |
Save
Question 10 (1 point)
The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________
Question 10 options:
cypto-attack | |
denial of service attack | |
side-channel attack | |
none of above |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started