Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Cellular network technology can serve more mobile subscribers than a single larg

ID: 3721849 • Letter: C

Question

Cellular network technology can serve more mobile subscribers than a single large transmitter.

Question 1 options:

True

False

Save

Question 2 (2 points)

___________ technology is used in 3G network

Question 2 options:

AMPS

GSM

CDMA

UMTS

Save

Question 3 (2 points)

The _________ allows for location-independent routing of IP datagrams on the Internet

Question 3 options:

TCP/IP

VPN

Mobile IP

SSH

Save

Question 4 (2 points)

BYOD remains both a major opportunity and challenge for enterprises.

Question 4 options:

True

False

Save

Question 5 (2 points)

The first generation of celluar networks were designed with very little security.

Question 5 options:

Ture

False

Save

Question 6 (2 points)

Which of following is (are) Google security service(s)?

Question 6 options:

Android updates

Verify Apps

Satetynet

All of above

Save

Question 7 (2 points)

Android provides an open source platform and application environment for mobile devices

Question 7 options:

True

False

Save

Question 8 (2 points)

Which of the following statement is NOT true in term of the security advantage of iOS?

Question 8 options:

iOS device is easier to path and update comparing to other mobile devices

iOS is an open system

Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure

iOS devices are difficult to hack

Save

Question 9 (2 points)

______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.

Question 9 options:

AndroRAT

Android SDK

Android framewrok for exploitation

none of above

Save

Question 10 (2 points)

GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators

Question 10 options:

Ture

false

Save

Question 11 (2 points)

In intrusion detection systems, _________ approach detects threats based on the patterns of well-known attacks.

Question 11 options:

anomaly-based

signature-based

distributed

power-consumption-based

Save

Question 12 (2 points)

The _________ represents the set of security features that enable nodes to securely exchange
signaling data, user data, and protect against attacks on the wire-line network.

Question 12 options:

network access security

network domain security

user domain security

application domain security

Save

Question 13 (2 points)

Which of following is (are) unique features of mobile security comparing to conventional computer security?

Question 13 options:

Strong connectivity

Technology convergence

Reduced capabilities

All of above

Save

Question 14 (2 points)

_____________ is behind the 1G celluar network.

Question 14 options:

AMPS

GSM

CDMA

UMTS

Save

Question 15 (2 points)

The _______ represents a set of features that enables the user to inform himself
whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

Question 15 options:

network access security

network domain security

application domain security

visibility and configurability of the security

Save

Question 16 (2 points)

In mobile security, the attacks that exploit the vulnerabilities of the UMTS security architecture can be generally categorized as __________ attacks.

Question 16 options:

worm-based

botnet

infrastructure-based

user-based

Save

Question 17 (2 points)

The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________

Question 17 options:

0cypto-attack

denial of service attack

side-channel attack

none of above

Save

Question 18 (2 points)

__________ is responsible for the radio link between the mobile user and the fixed part of the network in 3G network

Question 18 options:

MSC

GPRS

Node B

UTRAN

Save

Question 19 (2 points)

The use of ___________ can help preventing eavesdropper from identifying a GSM user by their IMSI

Question 19 options:

TMSI

SIM card

HLR

VLR

Save

Question 20 (2 points)

Which of the following is NOT security challenge to GSM cellular network?

Question 20 options:

Designed with little security

Lack of user visibility

Vulnerability to the DoS attack

Flaws in cryptographic algorithms

Save

Question 21 (2 points)

GSM standard has no provision for the integrity protection of the informaiton.

Question 21 options:

True

false

Save

Question 22 (2 points)

Which of following is (are) considered as secrutiy challenges to iOS devices?

Question 22 options:

Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X

Apple also patches their own software flaws on different schedules for different platforms

Both A and B

Neither A nor B

Save

Question 23 (2 points)

Which of following represents the third-generation telecommunication technology?

Question 23 options:

GPRS

UMTS

GSM

EDGE

Save

Question 24 (2 points)

The ______ cellular network requires the use of USIM and exculding the GSM SIM

Question 24 options:

1G

2G (GSM)

3G (UMTS)

4G LTE

Save

Question 25 (2 points)

In a GSM network, __________ algorithm is used to produce a ciphering key.

Question 25 options:

A1

A3

A5

A8

Save

Question 26 (2 points)

Blacklising is a more effective security measure than the whitelisting for BYOD

Question 26 options:

True

False

Save

Question 27 (2 points)

Which of following is (are) security improvement of 3G network comparing to GSM network?

Question 27 options:

The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC

The cryptographic keys derived on the User Services Identity Module (USIM) are longer

Protection of the signaling infrastructure in the core network

All of above

Save

Question 28 (2 points)

___________ celluar network uses analog signal for voice transmission.

Question 28 options:

1G

2G

A or B

Neither A nor B

Save

Question 29 (2 points)

The key characteristic of a cellular network is the ability to __________ to increase both coverage and capacity.

Question 29 options:

transmit using radio waves

re-use frequency

use high power transmitter

None of above

Save

Question 30 (2 points)

Apple uses integrated and secure software and hardware platform for iOS devices.

Question 30 options:

True

False

Save

Question 31 (2 points)

3G celluar network uses data services for both data and voice communication.

Question 31 options:

True

False

Save

Question 32 (2 points)

Which of the following is the biggest security challenge for Android system?

Question 32 options:

Fragmentation

Malware

User behavior

Compartmentalization

Save

Question 33 (2 points)

____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.

Question 33 options:

Application installation control

Containerization

Blacklisting

Whitelisting

Save

Question 34 (2 points)

Text messaging is first introduced in _____ network

Question 34 options:

1G

2G

3G

4G

Save

Question 35 (2 points)

In 2009, a iPhone malware, iKee.B, allows macilous third party to upload and execute shell commands on infected iPhone. This is an example of ___________.

Question 35 options:

wireless attacks

user-based attacks

botnet attacks

infrastructure-based attacks

Save

Question 36 (2 points)

Soundminer is a proof-of-concept Trojan targeting Android devices that is able to extract private data from the audio sensors. Soundminer is an example of ____________.

Question 36 options:

sniffing attack.

denial-of-service attack

overbilling attack

battery exhaustion attack

Save

Question 37 (2 points)

In a GSM network, the subscriber authentication is done through _________ algorithm.

Question 37 options:

A1

A3

A5

A8

Save

Question 38 (2 points)

________ cellular network is suitable for HD video streaming.

Question 38 options:

1G

2G

3G

4G

Save

True

False

Explanation / Answer

Answer 1 :

TRUE , A cellular network or versatile network is a correspondence network where the last link is wireless. The network is circulated over land regions called cells, each served by no less than one settled area handset, yet more ordinarily three cell locales or base handset stations. These base stations give the cell the network scope which can be utilized for transmission of voice, information and others. A phone normally utilizes an alternate arrangement of frequencies from neighboring cells, to keep away from impedance and give ensured benefit quality inside every phone.

Answer 2 :

UMTS , The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard. Developed and maintained by the 3GPP (3rd Generation Partnership Project).

Answer 3 :

TCP/IP , The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Every mobile hub is recognized by its street number neglecting its present location in the Internet. Abide far from its home system, a mobile hub is related with a care-of address which recognizes its present location and its place of residence is related with the nearby endpoint of a tunnel to its home specialist. Mobile IP indicates how a mobile hub registers with its home operator and how the home specialist courses datagrams to the mobile hub through the tunnel.

Answer 4 :

TRUE , BYOD security is frequently a test for ventures and SMBs alike. This stems from the way that with a specific end goal to be successful, organizations must apply some type of control over cell phones, tablets, and workstations that are not possessed by the organization but rather are representatives' close to home resources. As BYOD has turned out to be progressively normal and familiarity with security risks has developed, BYOD security approaches are winding up more generally embraced and acknowledged by the two organizations and their worker.

DEAR PLEASE DO RATE IT IF HELPS ELSE LET ME KNOW YOUR DOUBT.

KINDLY POST SEPARATELY TO GET ANSWERED AS WE ARE RESTRICTED TO ANSWER ONLY FIRST 4 PARTS OF IT .

THANK YOU

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote