Question: Cellular network technology can serve more mobile subscribers than a single large transmitter. Question 1 options: True False Save Question 2 (2 points) ___________ technology

Cellular network technology can serve more mobile subscribers than a single large transmitter.
Question 1 options:
| True | |
| False |
Save
Question 2 (2 points)

___________ technology is used in 3G network
Question 2 options:
| AMPS | |
| GSM | |
| CDMA | |
| UMTS |
Save
Question 3 (2 points)

The _________ allows for location-independent routing of IP datagrams on the Internet
Question 3 options:
| TCP/IP | |
| VPN | |
| Mobile IP | |
| SSH |
Save
Question 4 (2 points)

BYOD remains both a major opportunity and challenge for enterprises.
Question 4 options:
| True | |
| False |
Save
Question 5 (2 points)

The first generation of celluar networks were designed with very little security.
Question 5 options:
| Ture | |
| False |
Save
Question 6 (2 points)

Which of following is (are) Google security service(s)?
Question 6 options:
| Android updates | |
| Verify Apps | |
| Satetynet | |
| All of above |
Save
Question 7 (2 points)

Android provides an open source platform and application environment for mobile devices
Question 7 options:
| True | |
| False |
Save
Question 8 (2 points)

Which of the following statement is NOT true in term of the security advantage of iOS?
Question 8 options:
| iOS device is easier to path and update comparing to other mobile devices | |
| iOS is an open system | |
| Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure | |
| iOS devices are difficult to hack |
Save
Question 9 (2 points)

______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.
Question 9 options:
| AndroRAT | |
| Android SDK | |
| Android framewrok for exploitation | |
| none of above |
Save
Question 10 (2 points)

GSM defines standard authentication algorithms in order to avoid vulnerabilities of insecure solutions chosen by mobile operators
Question 10 options:
| Ture | |
| false |
Save
Question 11 (2 points)

In intrusion detection systems, _________ approach detects threats based on the patterns of well-known attacks.
Question 11 options:
| anomaly-based | |
| signature-based | |
| distributed | |
| power-consumption-based |
Save
Question 12 (2 points)

The _________ represents the set of security features that enable nodes to securely exchange signaling data, user data, and protect against attacks on the wire-line network.
Question 12 options:
| network access security | |
| network domain security | |
| user domain security | |
| application domain security |
Save
Question 13 (2 points)

Which of following is (are) unique features of mobile security comparing to conventional computer security?
Question 13 options:
| Strong connectivity | |
| Technology convergence | |
| Reduced capabilities | |
| All of above |
Save
Question 14 (2 points)

_____________ is behind the 1G celluar network.
Question 14 options:
| AMPS | |
| GSM | |
| CDMA | |
| UMTS |
Save
Question 15 (2 points)

The _______ represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.
Question 15 options:
| network access security | |
| network domain security | |
| application domain security | |
| visibility and configurability of the security |
Save
Question 16 (2 points)

In mobile security, the attacks that exploit the vulnerabilities of the UMTS security architecture can be generally categorized as __________ attacks.
Question 16 options:
| worm-based | |
| botnet | |
| infrastructure-based | |
| user-based |
Save
Question 17 (2 points)

The attack to cellular network that can recover the full cipher state in seconds, without the needing of any known keysreams is called ____________
Question 17 options:
| 0cypto-attack | |
| denial of service attack | |
| side-channel attack | |
| none of above |
Save
Question 18 (2 points)

__________ is responsible for the radio link between the mobile user and the fixed part of the network in 3G network
Question 18 options:
| MSC | |
| GPRS | |
| Node B | |
| UTRAN |
Save
Question 19 (2 points)

The use of ___________ can help preventing eavesdropper from identifying a GSM user by their IMSI
Question 19 options:
| TMSI | |
| SIM card | |
| HLR | |
| VLR |
Save
Question 20 (2 points)

Which of the following is NOT security challenge to GSM cellular network?
Question 20 options:
| Designed with little security | |
| Lack of user visibility | |
| Vulnerability to the DoS attack | |
| Flaws in cryptographic algorithms |
Save
Question 21 (2 points)

GSM standard has no provision for the integrity protection of the informaiton.
Question 21 options:
| True | |
| false |
Save
Question 22 (2 points)

Which of following is (are) considered as secrutiy challenges to iOS devices?
Question 22 options:
| Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X | |
| Apple also patches their own software flaws on different schedules for different platforms | |
| Both A and B | |
| Neither A nor B |
Save
Question 23 (2 points)

Which of following represents the third-generation telecommunication technology?
Question 23 options:
| GPRS | |
| UMTS | |
| GSM | |
| EDGE |
Save
Question 24 (2 points)

The ______ cellular network requires the use of USIM and exculding the GSM SIM
Question 24 options:
| 1G | |
| 2G (GSM) | |
| 3G (UMTS) | |
| 4G LTE |
Save
Question 25 (2 points)

In a GSM network, __________ algorithm is used to produce a ciphering key.
Question 25 options:
| A1 | |
| A3 | |
| A5 | |
| A8 |
Save
Question 26 (2 points)

Blacklising is a more effective security measure than the whitelisting for BYOD
Question 26 options:
| True | |
| False |
Save
Question 27 (2 points)

Which of following is (are) security improvement of 3G network comparing to GSM network?
Question 27 options:
| The extension of encryption and integrity protection coverage from the Mobile Equipment (ME) to the RNC | |
| The cryptographic keys derived on the User Services Identity Module (USIM) are longer | |
| Protection of the signaling infrastructure in the core network | |
| All of above |
Save
Question 28 (2 points)

___________ celluar network uses analog signal for voice transmission.
Question 28 options:
| 1G | |
| 2G | |
| A or B | |
| Neither A nor B |
Save
Question 29 (2 points)

The key characteristic of a cellular network is the ability to __________ to increase both coverage and capacity.
Question 29 options:
| transmit using radio waves | |
| re-use frequency | |
| use high power transmitter | |
| None of above |
Save
Question 30 (2 points)

Apple uses integrated and secure software and hardware platform for iOS devices.
Question 30 options:
| True | |
| False |
Save
Question 31 (2 points)

3G celluar network uses data services for both data and voice communication.
Question 31 options:
| True | |
| False |
Save
Question 32 (2 points)

Which of the following is the biggest security challenge for Android system?
Question 32 options:
| Fragmentation | |
| Malware | |
| User behavior | |
| Compartmentalization |
Save
Question 33 (2 points)

____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.
Question 33 options:
| Application installation control | |
| Containerization | |
| Blacklisting | |
| Whitelisting |
Save
Question 34 (2 points)

Text messaging is first introduced in _____ network
Question 34 options:
| 1G | |
| 2G | |
| 3G | |
| 4G |
Save
Question 35 (2 points)

In 2009, a iPhone malware, iKee.B, allows macilous third party to upload and execute shell commands on infected iPhone. This is an example of ___________.
Question 35 options:
| wireless attacks | |
| user-based attacks | |
| botnet attacks | |
| infrastructure-based attacks |
Save
Question 36 (2 points)

Soundminer is a proof-of-concept Trojan targeting Android devices that is able to extract private data from the audio sensors. Soundminer is an example of ____________.
Question 36 options:
| sniffing attack. | |
| denial-of-service attack | |
| overbilling attack | |
| battery exhaustion attack |
Save
Question 37 (2 points)

In a GSM network, the subscriber authentication is done through _________ algorithm.
Question 37 options:
| A1 | |
| A3 | |
| A5 | |
| A8 |
Save
Question 38 (2 points)

________ cellular network is suitable for HD video streaming.
Question 38 options:
| 1G | |
| 2G | |
| 3G | |
| 4G |
Save
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
