Securiy features in Mobile networks Flashcards
The ___ controls the allocation of new Temporary Mobile Subscriber Identity
(TMSI) numbers and notifies them to the ____
1) VLR allots and notifies HLR
2) HLR allots and notifies VLR
VLR allots and notifies HLR
TMSI may be updated while
1) Call setup
2) On entry to a new LAI
3) On entry to a new VLR
4) all the above
all the above
GSM air interface ____frequency hopping
1) supports
2) does not support
supports
frequency hopping is employed to
1) optimize network performance
2) make secure interface
3) saving spectrum
frequency hopping is employed to optimize network performance by overcoming interference problems in busy areas, to increase call quality
and capacity.
SIM card contains
1) security related information (IMSI, Ki, PIN)
2) subscriber related information
3) the algorithms A3 and A8
4) all the above
SIM card contains security related information (IMSI, Ki, PIN), other subscriber related information and the algorithms A3 and A8
SIM card contains
1) IMSI
2) TMSI
3) MSISDN
IMSI
SIM card contains algorithms
1) A3 and A8
2) A3 and A5
3) A5 and A8
1) A3 and A8
MS contains algorithm
1) A3
2) A5
3) A8
A5
Vernam Cipher algorithm
Vernam Cipher algorithm
1) A3
2) A5
3) A8
A5 in MS
The _____channel of the base system broadcasts a code to tell the mobile
station which of the encryption algorithms is in use that particular base GSM installations
1) SCH channel
2) BCCH channel
3) TCH channel
BCCH channel
GSM voice privacy encryption process uses _____ algorithm
1) A3
2) A5
3) A8
A5
Vernam Cipher algorithm
The encryption code (cipher mask) continuously varies and is synchronized to the _______ at both the base and mobile stations
1) burst counter
2) hyper-frame counter
hyper-frame counter
______ cipher mask bits for each normal burst in the data stream that is synchronized with the hyper-frame counter
1) 64
2) 116
3) 128
4) 256
116
The cipher mask is added (modulo 2) to the transmit information and flag bits _______ differential encoding and modulation
1) before
2) after
before
The generation of the Kc is based on the ___ algorithms
1) A3
2) A5
3) A8
A8 Crypto Graphical alogorithms
This ciphering start procedure is initiated from the _____ by sending the message a cipher mode command the ___.
1) MSC / HLR, Kc
2) MSC / VLR, Kc
3) MSC / HLR, Ki
4) MSC / VLR, Ki
MSC / VLR, Kc
The ___ will be removed from the message by the BTS before sending it on to the MS
1) Ki
2) Kc
Kc
Kc is sent _____ on the air
1) during initialization
2) during authorization
3) never
never