Securiy features in Mobile networks Flashcards

1
Q

The ___ controls the allocation of new Temporary Mobile Subscriber Identity
(TMSI) numbers and notifies them to the ____
1) VLR allots and notifies HLR
2) HLR allots and notifies VLR

A

VLR allots and notifies HLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TMSI may be updated while
1) Call setup
2) On entry to a new LAI
3) On entry to a new VLR
4) all the above

A

all the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GSM air interface ____frequency hopping
1) supports
2) does not support

A

supports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

frequency hopping is employed to
1) optimize network performance
2) make secure interface
3) saving spectrum

A

frequency hopping is employed to optimize network performance by overcoming interference problems in busy areas, to increase call quality
and capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIM card contains
1) security related information (IMSI, Ki, PIN)
2) subscriber related information
3) the algorithms A3 and A8
4) all the above

A

SIM card contains security related information (IMSI, Ki, PIN), other subscriber related information and the algorithms A3 and A8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SIM card contains
1) IMSI
2) TMSI
3) MSISDN

A

IMSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIM card contains algorithms
1) A3 and A8
2) A3 and A5
3) A5 and A8

A

1) A3 and A8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MS contains algorithm
1) A3
2) A5
3) A8

A

A5
Vernam Cipher algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vernam Cipher algorithm
1) A3
2) A5
3) A8

A

A5 in MS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____channel of the base system broadcasts a code to tell the mobile
station which of the encryption algorithms is in use that particular base GSM installations
1) SCH channel
2) BCCH channel
3) TCH channel

A

BCCH channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GSM voice privacy encryption process uses _____ algorithm
1) A3
2) A5
3) A8

A

A5
Vernam Cipher algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The encryption code (cipher mask) continuously varies and is synchronized to the _______ at both the base and mobile stations
1) burst counter
2) hyper-frame counter

A

hyper-frame counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ cipher mask bits for each normal burst in the data stream that is synchronized with the hyper-frame counter
1) 64
2) 116
3) 128
4) 256

A

116

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The cipher mask is added (modulo 2) to the transmit information and flag bits _______ differential encoding and modulation
1) before
2) after

A

before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The generation of the Kc is based on the ___ algorithms
1) A3
2) A5
3) A8

A

A8 Crypto Graphical alogorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This ciphering start procedure is initiated from the _____ by sending the message a cipher mode command the ___.
1) MSC / HLR, Kc
2) MSC / VLR, Kc
3) MSC / HLR, Ki
4) MSC / VLR, Ki

A

MSC / VLR, Kc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ___ will be removed from the message by the BTS before sending it on to the MS
1) Ki
2) Kc

A

Kc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Kc is sent _____ on the air
1) during initialization
2) during authorization
3) never

A

never

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In 5G, AKA stands for

A

Authentication Key Agreement

20
Q

In most cases for Authentication Key Agreement(AKA), operators use ___________ algorithm
1) A3, A5, A8
2) Milenage/TUAK

A

Milenage/TUAK

21
Q

In 5G, KDF stands for

A

Key Derivation Function

22
Q

In 5G, UDM stands for

A

Unified Data Management

23
Q

In 5G, ASF/AUSF stands for

A

Authentication Server Function

24
Q

In 5G, PCF stands for

A

Policy Control Function

25
Q

In 5G, SMF stands for

A

Session Management Function

26
Q

Match identifier and name (AES, ZUC, Snow3G)
128NEA-1
128NEA-2
128NEA-3

A

128NEA-1 : Snow3G
128NEA-2 : AES
128NEA-3 : ZUC

27
Q

Identifier in 5G similar to IMSI for 2G/3G/4G
1) SUPI
2) GUTI
3) SUCI

A

SUPI (Subscription Permanent Identifier)

28
Q

Identifier in 4G/5G similar to TMSI in 2G/3G
1) SUPI
2) GUTI
3) SUCI

A

GUTI(Globally Unique Temporary Identifier)

29
Q

“_________” attacks persist in today’s mobile networks including the 4G LTE/LTE-Adv
1) IMSI catching
2) TMSI catching

A

IMSI catching

30
Q

concealed SUPI is known as
1) CUPI
2) SUCI

A

SUCI (Subscription Concealed Identifier )

31
Q

___ security specifications do
not allow plain-text transmissions of the IMSI/SUPI over the radio interface
1) 3G onwards
2) 4G onwards
3) 5G

A

5G

32
Q

SUPI is concealed using
1) ECEIS
2) ECIES
3) ESIEC
4) EICES

A

2) ECIES ( Elliptic
Curve Integrated Encryption Scheme)
Only the MSIN part of the SUPI gets concealed by the protection scheme while the home network identifier i.e. MCC/MNC gets transmitted in plain-text

33
Q

a valid SUPI can be
1) IMSI
2) NAI (Network Access Identifier)
3) either 1 or 2

A

either 1 or 2

34
Q

Home Network Identifier in SUCI represents
1) MCC+MNC for IMSI
2) domain name representation for NAI
3) either 1 or 2

A

either 1 or 2
(SUCI type 0: IMSI, 1: NAI, 2 to 7: spare value for future use)

35
Q

choose correct item(s)
Home Network Public Key Identifier
1) key used for cyphering
2) key used for SUPI protection
3) key used for traffic encryption
4) public key provisioned by the HPLMN

A

2 and 4
key used for SUPI protection
public key provisioned by the HPLMN

36
Q

In 5G, AMF stands for

A

Access and Mobility Management

37
Q

In 5G, GUAMI stands for

A

Globally Unique AMF ID

38
Q

4G GUTI to 5G GUTI Conversion to identify
1) MME ID
2) AMF
3) SUPI
4) SUCI

A

MME ID

39
Q

5G GUTI to 4G GUTI Conversion to identify
1) MME ID
2) AMF
3) SUPI
4) SUCI

A

AMF

40
Q

The SUPI value is provisioned in
1) USIM
2) UDM/UDR function in 5G Core
3) both

A

both

41
Q

Only the ____ part of the SUPI gets concealed by the 5G protection scheme
1) MCC
2) MNC
3) MSIN

A

MSIN

42
Q

Home network identifier can be
1) MCC+MNC
2) domain name
3) either 1 or 2

A

either 1 or 2 depending on SUPI type value

43
Q

____ is provisioned in USIM
1) TMSI
2) routing indicator

A

routing indicator

44
Q

AMF provides new 5G GUTI when receiving
1) initial registraion request
2) periodic registration update
3)network triggered Service Request message
4) all of the above

A

all of the above

45
Q

_______ is the shortened form of the GUTI to enable more efficient radio signalling procedures e.g. during Paging and Service Request
1) TMSI
2) S-TMSI
3) AMF ID

A

S-TMSI

46
Q
A