Question: Cellular network technology can serve more mobile subscribers than a single large transmitter. Question 1 options: True False Save Question 2 (2 points) ___________ technology

 Cellular network technology can serve more mobile subscribers than a single

Cellular network technology can serve more mobile subscribers than a single large transmitter.

Question 1 options:

True

False

Save

Question 2 (2 points)

large transmitter. Question 1 options: True False Save Question 2 (2 points)

___________ technology is used in 3G network

Question 2 options:

AMPS

GSM

CDMA

UMTS

Save

Question 3 (2 points)

___________ technology is used in 3G network Question 2 options: AMPS GSM

The _________ allows for location-independent routing of IP datagrams on the Internet

Question 3 options:

TCP/IP

VPN

Mobile IP

SSH

Save

Question 4 (2 points)

CDMA UMTS Save Question 3 (2 points) The _________ allows for location-independent

BYOD remains both a major opportunity and challenge for enterprises.

Question 4 options:

True

False

Save

Question 5 (2 points)

routing of IP datagrams on the Internet Question 3 options: TCP/IP VPN

The first generation of celluar networks were designed with very little security.

Question 5 options:

Ture

False

Save

Question 6 (2 points)

Mobile IP SSH Save Question 4 (2 points) BYOD remains both a

Which of following is (are) Google security service(s)?

Question 6 options:

Android updates

Verify Apps

Satetynet

All of above

Save

Question 7 (2 points)

major opportunity and challenge for enterprises. Question 4 options: True False Save

Android provides an open source platform and application environment for mobile devices

Question 7 options:

True

False

Save

Question 8 (2 points)

Question 5 (2 points) The first generation of celluar networks were designed

Which of the following statement is NOT true in term of the security advantage of iOS?

Question 8 options:

iOS device is easier to path and update comparing to other mobile devices

iOS is an open system

Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure

iOS devices are difficult to hack

Save

Question 9 (2 points)

with very little security. Question 5 options: Ture False Save Question 6

______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.

Question 9 options:

AndroRAT

Android SDK

Android framewrok for exploitation

none of above

Save

Question 10 (2 points)

(2 points) Which of following is (are) Google security service(s)? Question 6

GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators

Question 10 options:

Ture

false

Save

Question 11 (2 points)

options: Android updates Verify Apps Satetynet All of above Save Question 7

In intrusion detection systems, _________ approach detects threats based on the patterns of well-known attacks.

Question 11 options:

anomaly-based

signature-based

distributed

power-consumption-based

Save

Question 12 (2 points)

(2 points) Android provides an open source platform and application environment for

The _________ represents the set of security features that enable nodes to securely exchange signaling data, user data, and protect against attacks on the wire-line network.

Question 12 options:

network access security

network domain security

user domain security

application domain security

Save

Question 13 (2 points)

mobile devices Question 7 options: True False Save Question 8 (2 points)

Which of following is (are) unique features of mobile security comparing to conventional computer security?

Question 13 options:

Strong connectivity

Technology convergence

Reduced capabilities

All of above

Save

Question 14 (2 points)

Which of the following statement is NOT true in term of the

_____________ is behind the 1G celluar network.

Question 14 options:

AMPS

GSM

CDMA

UMTS

Save

Question 15 (2 points)

security advantage of iOS? Question 8 options: iOS device is easier to

The _______ represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

Question 15 options:

network access security

network domain security

application domain security

visibility and configurability of the security

Save

Question 16 (2 points)

path and update comparing to other mobile devices iOS is an open

In mobile security, the attacks that exploit the vulnerabilities of the UMTS security architecture can be generally categorized as __________ attacks.

Question 16 options:

worm-based

botnet

infrastructure-based

user-based

Save

Question 17 (2 points)

system Greater market share and public scrutiny means that Apple faces considerable

The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________

Question 17 options:

0cypto-attack

denial of service attack

side-channel attack

none of above

Save

Question 18 (2 points)

public pressure to keep the platform secure iOS devices are difficult to

__________ is responsible for the radio link between the mobile user and the fixed part of the network in 3G network

Question 18 options:

MSC

GPRS

Node B

UTRAN

Save

Question 19 (2 points)

hack Save Question 9 (2 points) ______________ is an open source project

The use of ___________ can help preventing eavesdropper from identifying a GSM user by their IMSI

Question 19 options:

TMSI

SIM card

HLR

VLR

Save

Question 20 (2 points)

which aim is to demonstrate the existence of security holes in the

Which of the following is NOT security challenge to GSM cellular network?

Question 20 options:

Designed with little security

Lack of user visibility

Vulnerability to the DoS attack

Flaws in cryptographic algorithms

Save

Question 21 (2 points)

popular mobile operating system. Question 9 options: AndroRAT Android SDK Android framewrok

GSM standard has no provision for the integrity protection of the informaiton.

Question 21 options:

True

false

Save

Question 22 (2 points)

for exploitation none of above Save Question 10 (2 points) GSM defines

Which of following is (are) considered as secrutiy challenges to iOS devices?

Question 22 options:

Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X

Apple also patches their own software flaws on different schedules for different platforms

Both A and B

Neither A nor B

Save

Question 23 (2 points)

standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen

Which of following represents the third-generation telecommunication technology?

Question 23 options:

GPRS

UMTS

GSM

EDGE

Save

Question 24 (2 points)

by mobile operators Question 10 options: Ture false Save Question 11 (2

The ______ cellular network requires the use of USIM and exculding the GSM SIM

Question 24 options:

1G

2G (GSM)

3G (UMTS)

4G LTE

Save

Question 25 (2 points)

points) In intrusion detection systems, _________ approach detects threats based on the

In a GSM network, __________ algorithm is used to produce a ciphering key.

Question 25 options:

A1

A3

A5

A8

Save

Question 26 (2 points)

patterns of well-known attacks. Question 11 options: anomaly-based signature-based distributed power-consumption-based Save

Blacklising is a more effective security measure than the whitelisting for BYOD

Question 26 options:

True

False

Save

Question 27 (2 points)

Question 12 (2 points) The _________ represents the set of security features

Which of following is (are) security improvement of 3G network comparing to GSM network?

Question 27 options:

The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC

The cryptographic keys derived on the User Services Identity Module (USIM) are longer

Protection of the signaling infrastructure in the core network

All of above

Save

Question 28 (2 points)

that enable nodes to securely exchange signaling data, user data, and protect

___________ celluar network uses analog signal for voice transmission.

Question 28 options:

1G

2G

A or B

Neither A nor B

Save

Question 29 (2 points)

against attacks on the wire-line network. Question 12 options: network access security

The key characteristic of a cellular network is the ability to __________ to increase both coverage and capacity.

Question 29 options:

transmit using radio waves

re-use frequency

use high power transmitter

None of above

Save

Question 30 (2 points)

network domain security user domain security application domain security Save Question 13

Apple uses integrated and secure software and hardware platform for iOS devices.

Question 30 options:

True

False

Save

Question 31 (2 points)

(2 points) Which of following is (are) unique features of mobile security

3G celluar network uses data services for both data and voice communication.

Question 31 options:

True

False

Save

Question 32 (2 points)

comparing to conventional computer security? Question 13 options: Strong connectivity Technology convergence

Which of the following is the biggest security challenge for Android system?

Question 32 options:

Fragmentation

Malware

User behavior

Compartmentalization

Save

Question 33 (2 points)

Reduced capabilities All of above Save Question 14 (2 points) _____________ is

____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.

Question 33 options:

Application installation control

Containerization

Blacklisting

Whitelisting

Save

Question 34 (2 points)

behind the 1G celluar network. Question 14 options: AMPS GSM CDMA UMTS

Text messaging is first introduced in _____ network

Question 34 options:

1G

2G

3G

4G

Save

Question 35 (2 points)

Save Question 15 (2 points) The _______ represents a set of features

In 2009, a iPhone malware, iKee.B, allows macilous third party to upload and execute shell commands on infected iPhone. This is an example of ___________.

Question 35 options:

wireless attacks

user-based attacks

botnet attacks

infrastructure-based attacks

Save

Question 36 (2 points)

that enables the user to inform himself whether a security feature is

Soundminer is a proof-of-concept Trojan targeting Android devices that is able to extract private data from the audio sensors. Soundminer is an example of ____________.

Question 36 options:

sniffing attack.

denial-of-service attack

overbilling attack

battery exhaustion attack

Save

Question 37 (2 points)

in operation or not and whether the use and provision of services

In a GSM network, the subscriber authentication is done through _________ algorithm.

Question 37 options:

A1

A3

A5

A8

Save

Question 38 (2 points)

should depend on the security feature. Question 15 options: network access security

________ cellular network is suitable for HD video streaming.

Question 38 options:

1G

2G

3G

4G

Save

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!