Which of the following is NOT security challenge to GSM cellular network? Questi
ID: 3730610 • Letter: W
Question
Which of the following is NOT security challenge to GSM cellular network?
Question 1 options:
Designed with little security
Lack of user visibility
Vulnerability to the DoS attack
Flaws in cryptographic algorithms
Save
Question 2 (1 point)
GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators
Question 2 options:
Ture
false
Save
Question 3 (1 point)
GSM standard has no provision for the integrity protection of the informaiton.
Question 3 options:
True
false
Save
Question 4 (1 point)
The _______ represents a set of features that enables the user to inform himself
whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.
Question 4 options:
network access security
network domain security
application domain security
visibility and configurability of the security
Save
Question 5 (1 point)
The first generation of celluar networks were designed with very little security.
Question 5 options:
Ture
False
Save
Question 6 (1 point)
Which of following is (are) security improvement of 3G network comparing to GSM network?
Question 6 options:
The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC
The cryptographic keys derived on the User Services Identity Module (USIM) are longer
Protection of the signaling infrastructure in the core network
All of above
Save
Question 7 (1 point)
The ______ cellular network requires the use of USIM and exculding the GSM SIM
Question 7 options:
1G
2G (GSM)
3G (UMTS)
4G LTE
Save
Question 8 (1 point)
The _________ represents the set of security features that enable nodes to securely exchange
signaling data, user data, and protect against attacks on the wire-line network.
Question 8 options:
network access security
network domain security
user domain security
application domain security
Save
Question 9 (1 point)
In a GSM network, the subscriber authentication is done through _________ algorithm.
Question 9 options:
A1
A3
A5
A8
Save
Question 10 (1 point)
The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________
Question 10 options:
cypto-attack
denial of service attack
side-channel attack
none of above
Designed with little security
Lack of user visibility
Vulnerability to the DoS attack
Flaws in cryptographic algorithms
Explanation / Answer
According to chegg guidelines i have to solve first four bits only.
1.
Option 1 correct.
Challenge to GSM cellular network:
2.
False
Since UMTS defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators
3.
True
4.
Option 4 correct.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.