UMTS Security Quiz
24 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the encryption algorithm used for confidentiality/integrity in UMTS security?

  • AES (correct)
  • DES
  • RSA
  • RC4

Which mobile networks utilize SIM authentication with PIN code?

  • GSM and UMTS (correct)
  • UMTS and TETRA
  • GSM and TETRA
  • GSM and DECT

What does UMTS security provide to protect signalling data?

  • Mutual Authentication
  • Integrity protection (correct)
  • Confidentiality
  • User data payload encryption

In UMTS security, what is the procedure for verifying the authenticity of an entity?

<p>Authentication (C)</p> Signup and view all the answers

What is the basis for security in UMTS security?

<p>Open algorithms (A)</p> Signup and view all the answers

Which network authentication is supported in UMTS security?

<p>UMTS (C)</p> Signup and view all the answers

What does UMTS security use to protect user data payload?

<p>Encryption (C)</p> Signup and view all the answers

What is used for secure negotiation of protection algorithms in UMTS security?

<p>Mutual Authentication (C)</p> Signup and view all the answers

In UMTS security, what is the known algorithm used for ciphering?

<p>KASUMI (B)</p> Signup and view all the answers

What is the primary focus of SIM authentication in UMTS security?

<p>User authentication (C)</p> Signup and view all the answers

Which standard is the UMTS security encryption algorithm based on?

<p>AES (C)</p> Signup and view all the answers

What does UMTS security use to protect signalling data integrity?

<p>Integrity protection (D)</p> Signup and view all the answers

What is the property that data has not been altered in an unauthorized manner?

<p>Integrity (B)</p> Signup and view all the answers

In which network, signaling messages are appended with a 32-bit security field (MAC-I) at the terminal or RNC before transmission and checked at the receiving end?

<p>UMTS (C)</p> Signup and view all the answers

What is used to prevent unencrypted transmission of user ID information such as IMSI number over the air interface?

<p>TMSI (B)</p> Signup and view all the answers

Which security attack is prevented by a combination of key freshness and integrity protection of signaling data, not by authenticating the serving network?

<p>Man-in-the-middle attack (A)</p> Signup and view all the answers

What is the 128-bit key used for key agreement on cipher key CK and integrity key IK in UMTS AKA?

<p>K (B)</p> Signup and view all the answers

Which entity can generate random challenges RAND in UMTS AKA?

<p>AuC (D)</p> Signup and view all the answers

What is used to verify that RAND and AUTN had been generated by the home AuC in UMTS AKA?

<p>XMAC (D)</p> Signup and view all the answers

What does AMF stand for in UMTS AKA?

<p>Authentication Management Field (B)</p> Signup and view all the answers

What is used to detect replay attacks in UMTS AKA?

<p>SQN (D)</p> Signup and view all the answers

What is used to prevent false base station attacks in UMTS AKA?

<p>Key freshness (C)</p> Signup and view all the answers

Which property ensures that information is not made available to unauthorized individuals, entities, or processes?

<p>Confidentiality (C)</p> Signup and view all the answers

In UMTS, where is the signaling integrity protection applied?

<p>Both in terminal and RNC (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser