Cellular network technology can serve more mobile subscribers than a single larg
ID: 3721849 • Letter: C
Question
Cellular network technology can serve more mobile subscribers than a single large transmitter.
Question 1 options:
True
False
Save
Question 2 (2 points)
___________ technology is used in 3G network
Question 2 options:
AMPS
GSM
CDMA
UMTS
Save
Question 3 (2 points)
The _________ allows for location-independent routing of IP datagrams on the Internet
Question 3 options:
TCP/IP
VPN
Mobile IP
SSH
Save
Question 4 (2 points)
BYOD remains both a major opportunity and challenge for enterprises.
Question 4 options:
True
False
Save
Question 5 (2 points)
The first generation of celluar networks were designed with very little security.
Question 5 options:
Ture
False
Save
Question 6 (2 points)
Which of following is (are) Google security service(s)?
Question 6 options:
Android updates
Verify Apps
Satetynet
All of above
Save
Question 7 (2 points)
Android provides an open source platform and application environment for mobile devices
Question 7 options:
True
False
Save
Question 8 (2 points)
Which of the following statement is NOT true in term of the security advantage of iOS?
Question 8 options:
iOS device is easier to path and update comparing to other mobile devices
iOS is an open system
Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure
iOS devices are difficult to hack
Save
Question 9 (2 points)
______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.
Question 9 options:
AndroRAT
Android SDK
Android framewrok for exploitation
none of above
Save
Question 10 (2 points)
GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators
Question 10 options:
Ture
false
Save
Question 11 (2 points)
In intrusion detection systems, _________ approach detects threats based on the patterns of well-known attacks.
Question 11 options:
anomaly-based
signature-based
distributed
power-consumption-based
Save
Question 12 (2 points)
The _________ represents the set of security features that enable nodes to securely exchange
signaling data, user data, and protect against attacks on the wire-line network.
Question 12 options:
network access security
network domain security
user domain security
application domain security
Save
Question 13 (2 points)
Which of following is (are) unique features of mobile security comparing to conventional computer security?
Question 13 options:
Strong connectivity
Technology convergence
Reduced capabilities
All of above
Save
Question 14 (2 points)
_____________ is behind the 1G celluar network.
Question 14 options:
AMPS
GSM
CDMA
UMTS
Save
Question 15 (2 points)
The _______ represents a set of features that enables the user to inform himself
whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.
Question 15 options:
network access security
network domain security
application domain security
visibility and configurability of the security
Save
Question 16 (2 points)
In mobile security, the attacks that exploit the vulnerabilities of the UMTS security architecture can be generally categorized as __________ attacks.
Question 16 options:
worm-based
botnet
infrastructure-based
user-based
Save
Question 17 (2 points)
The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________
Question 17 options:
0cypto-attack
denial of service attack
side-channel attack
none of above
Save
Question 18 (2 points)
__________ is responsible for the radio link between the mobile user and the fixed part of the network in 3G network
Question 18 options:
MSC
GPRS
Node B
UTRAN
Save
Question 19 (2 points)
The use of ___________ can help preventing eavesdropper from identifying a GSM user by their IMSI
Question 19 options:
TMSI
SIM card
HLR
VLR
Save
Question 20 (2 points)
Which of the following is NOT security challenge to GSM cellular network?
Question 20 options:
Designed with little security
Lack of user visibility
Vulnerability to the DoS attack
Flaws in cryptographic algorithms
Save
Question 21 (2 points)
GSM standard has no provision for the integrity protection of the informaiton.
Question 21 options:
True
false
Save
Question 22 (2 points)
Which of following is (are) considered as secrutiy challenges to iOS devices?
Question 22 options:
Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X
Apple also patches their own software flaws on different schedules for different platforms
Both A and B
Neither A nor B
Save
Question 23 (2 points)
Which of following represents the third-generation telecommunication technology?
Question 23 options:
GPRS
UMTS
GSM
EDGE
Save
Question 24 (2 points)
The ______ cellular network requires the use of USIM and exculding the GSM SIM
Question 24 options:
1G
2G (GSM)
3G (UMTS)
4G LTE
Save
Question 25 (2 points)
In a GSM network, __________ algorithm is used to produce a ciphering key.
Question 25 options:
A1
A3
A5
A8
Save
Question 26 (2 points)
Blacklising is a more effective security measure than the whitelisting for BYOD
Question 26 options:
True
False
Save
Question 27 (2 points)
Which of following is (are) security improvement of 3G network comparing to GSM network?
Question 27 options:
The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC
The cryptographic keys derived on the User Services Identity Module (USIM) are longer
Protection of the signaling infrastructure in the core network
All of above
Save
Question 28 (2 points)
___________ celluar network uses analog signal for voice transmission.
Question 28 options:
1G
2G
A or B
Neither A nor B
Save
Question 29 (2 points)
The key characteristic of a cellular network is the ability to __________ to increase both coverage and capacity.
Question 29 options:
transmit using radio waves
re-use frequency
use high power transmitter
None of above
Save
Question 30 (2 points)
Apple uses integrated and secure software and hardware platform for iOS devices.
Question 30 options:
True
False
Save
Question 31 (2 points)
3G celluar network uses data services for both data and voice communication.
Question 31 options:
True
False
Save
Question 32 (2 points)
Which of the following is the biggest security challenge for Android system?
Question 32 options:
Fragmentation
Malware
User behavior
Compartmentalization
Save
Question 33 (2 points)
____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.
Question 33 options:
Application installation control
Containerization
Blacklisting
Whitelisting
Save
Question 34 (2 points)
Text messaging is first introduced in _____ network
Question 34 options:
1G
2G
3G
4G
Save
Question 35 (2 points)
In 2009, a iPhone malware, iKee.B, allows macilous third party to upload and execute shell commands on infected iPhone. This is an example of ___________.
Question 35 options:
wireless attacks
user-based attacks
botnet attacks
infrastructure-based attacks
Save
Question 36 (2 points)
Soundminer is a proof-of-concept Trojan targeting Android devices that is able to extract private data from the audio sensors. Soundminer is an example of ____________.
Question 36 options:
sniffing attack.
denial-of-service attack
overbilling attack
battery exhaustion attack
Save
Question 37 (2 points)
In a GSM network, the subscriber authentication is done through _________ algorithm.
Question 37 options:
A1
A3
A5
A8
Save
Question 38 (2 points)
________ cellular network is suitable for HD video streaming.
Question 38 options:
1G
2G
3G
4G
Save
True
False
Explanation / Answer
Answer 1 :
TRUE , A cellular network or versatile network is a correspondence network where the last link is wireless. The network is circulated over land regions called cells, each served by no less than one settled area handset, yet more ordinarily three cell locales or base handset stations. These base stations give the cell the network scope which can be utilized for transmission of voice, information and others. A phone normally utilizes an alternate arrangement of frequencies from neighboring cells, to keep away from impedance and give ensured benefit quality inside every phone.
Answer 2 :
UMTS , The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard. Developed and maintained by the 3GPP (3rd Generation Partnership Project).
Answer 3 :
TCP/IP , The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Every mobile hub is recognized by its street number neglecting its present location in the Internet. Abide far from its home system, a mobile hub is related with a care-of address which recognizes its present location and its place of residence is related with the nearby endpoint of a tunnel to its home specialist. Mobile IP indicates how a mobile hub registers with its home operator and how the home specialist courses datagrams to the mobile hub through the tunnel.
Answer 4 :
TRUE , BYOD security is frequently a test for ventures and SMBs alike. This stems from the way that with a specific end goal to be successful, organizations must apply some type of control over cell phones, tablets, and workstations that are not possessed by the organization but rather are representatives' close to home resources. As BYOD has turned out to be progressively normal and familiarity with security risks has developed, BYOD security approaches are winding up more generally embraced and acknowledged by the two organizations and their worker.
DEAR PLEASE DO RATE IT IF HELPS ELSE LET ME KNOW YOUR DOUBT.
KINDLY POST SEPARATELY TO GET ANSWERED AS WE ARE RESTRICTED TO ANSWER ONLY FIRST 4 PARTS OF IT .
THANK YOU
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.