GSM Network Security

Description: This quiz covers the fundamentals of GSM Network Security, including encryption algorithms, authentication protocols, and security vulnerabilities.
Number of Questions: 15
Created by:
Tags: gsm network security encryption authentication
Attempted 0/15 Correct 0 Score 0

Which encryption algorithm is used to protect the communication between a mobile station and a base station in GSM networks?

  1. AES

  2. DES

  3. RC4

  4. RSA


Correct Option: C
Explanation:

RC4 is a stream cipher that is used to encrypt the communication between a mobile station and a base station in GSM networks.

What is the purpose of the Authentication Center (AuC) in a GSM network?

  1. To generate temporary encryption keys

  2. To store user identities and passwords

  3. To authenticate mobile stations

  4. To manage network resources


Correct Option: B
Explanation:

The Authentication Center (AuC) in a GSM network stores user identities and passwords.

Which authentication protocol is used in GSM networks to authenticate mobile stations?

  1. CHAP

  2. PAP

  3. EAP

  4. MD5


Correct Option: C
Explanation:

EAP (Extensible Authentication Protocol) is used in GSM networks to authenticate mobile stations.

What is the purpose of the International Mobile Equipment Identity (IMEI) in a GSM network?

  1. To identify a mobile station

  2. To track the location of a mobile station

  3. To store user data

  4. To manage network resources


Correct Option: A
Explanation:

The International Mobile Equipment Identity (IMEI) is used to identify a mobile station in a GSM network.

Which security vulnerability allows an attacker to intercept and decrypt GSM communications?

  1. Man-in-the-Middle attack

  2. Replay attack

  3. DoS attack

  4. Phishing attack


Correct Option: A
Explanation:

A Man-in-the-Middle attack allows an attacker to intercept and decrypt GSM communications.

What is the purpose of the Subscriber Identity Module (SIM) in a GSM network?

  1. To store user data

  2. To authenticate mobile stations

  3. To manage network resources

  4. To track the location of a mobile station


Correct Option: B
Explanation:

The Subscriber Identity Module (SIM) is used to authenticate mobile stations in a GSM network.

Which security vulnerability allows an attacker to impersonate a legitimate mobile station in a GSM network?

  1. Cloning attack

  2. Spoofing attack

  3. DoS attack

  4. Phishing attack


Correct Option: A
Explanation:

A Cloning attack allows an attacker to impersonate a legitimate mobile station in a GSM network.

What is the purpose of the Base Transceiver Station (BTS) in a GSM network?

  1. To manage network resources

  2. To authenticate mobile stations

  3. To transmit and receive signals from mobile stations

  4. To store user data


Correct Option: C
Explanation:

The Base Transceiver Station (BTS) is used to transmit and receive signals from mobile stations in a GSM network.

Which security vulnerability allows an attacker to eavesdrop on GSM communications?

  1. Eavesdropping attack

  2. Replay attack

  3. DoS attack

  4. Phishing attack


Correct Option: A
Explanation:

An Eavesdropping attack allows an attacker to eavesdrop on GSM communications.

What is the purpose of the Mobile Switching Center (MSC) in a GSM network?

  1. To manage network resources

  2. To authenticate mobile stations

  3. To transmit and receive signals from mobile stations

  4. To establish and maintain connections between mobile stations


Correct Option: D
Explanation:

The Mobile Switching Center (MSC) is used to establish and maintain connections between mobile stations in a GSM network.

Which security vulnerability allows an attacker to disrupt GSM services?

  1. DoS attack

  2. Replay attack

  3. Eavesdropping attack

  4. Phishing attack


Correct Option: A
Explanation:

A DoS attack allows an attacker to disrupt GSM services.

What is the purpose of the Home Location Register (HLR) in a GSM network?

  1. To store user data

  2. To authenticate mobile stations

  3. To manage network resources

  4. To track the location of a mobile station


Correct Option: D
Explanation:

The Home Location Register (HLR) is used to track the location of a mobile station in a GSM network.

Which security vulnerability allows an attacker to send fraudulent SMS messages?

  1. SMS spoofing attack

  2. Replay attack

  3. DoS attack

  4. Phishing attack


Correct Option: A
Explanation:

An SMS spoofing attack allows an attacker to send fraudulent SMS messages.

What is the purpose of the Visitor Location Register (VLR) in a GSM network?

  1. To store user data

  2. To authenticate mobile stations

  3. To manage network resources

  4. To track the location of a mobile station


Correct Option: D
Explanation:

The Visitor Location Register (VLR) is used to track the location of a mobile station in a GSM network.

Which security vulnerability allows an attacker to gain unauthorized access to a GSM network?

  1. Phishing attack

  2. Replay attack

  3. DoS attack

  4. War driving attack


Correct Option: D
Explanation:

A War driving attack allows an attacker to gain unauthorized access to a GSM network.

- Hide questions