1. Cellular networks are organized as collections of interconnected:

A. Message Integrity Codes (MIC).

B. Temporal Key Integrity Protocols (TKIP).

C. Application Program Interfaces.

D. Network Areas.

E. Extensible Authentication Protocol (EAP) framework.

2. The core network is facilitated by network servers, which are also called?

A. Middle Layers.

B. Network Layers.

C. Transport Layers.

D. Service Nodes.

E. All of the above.

3. What is a basic service in the circuit-switched domain?

A. Secure on-demand routing protocol service.

B. Taxonomy service.

C. Caller delivery service.

D. Authenticated Routing for Ad hoc Networks (ARAN) service.

E. Destination-Sequenced Distance Vector (DSDV) routing service.

4. The cloning of cellular devices to utilize the network resources without paying; and cloning BSs to entice users to camp at the cloned BS in an attack, is called a:

A. False base station attack.

B. Privacy attack.

C. Eavesdropping attack.

D. Man-in-the-Middle Attack.

E. Passive attack.

5. What introduces the biggest threat to the security of cellular networks?

A. HELLO Flood connectivity.

B. Denial-of-service attack connectivity.

C. Internet connectivity.

D. Sybil connectivity.

E. All of the above.

Please answer with reasons.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *