Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

EXAM IN TTM4137 – WIRELESS SECURITY, Lecture notes of Wireless Networking

TTM4137 Final Exam, Dec. 04, 2013. 1. Part I. Wireless Networks Security Facts (50%). This part consists of 25 multiple choice questions.

Typology: Lecture notes

2022/2023

Uploaded on 05/11/2023

marphy
marphy 🇺🇸

4.3

(29)

41 documents

1 / 9

Toggle sidebar

Related documents


Partial preview of the text

Download EXAM IN TTM4137 – WIRELESS SECURITY and more Lecture notes Wireless Networking in PDF only on Docsity! English Norwegian University of Science and Technology Department of Telematics EXAM IN TTM4137 – WIRELESS SECURITY Contact person: Professor Danilo Gligoroski. (Tel. 95089319). Date of exam: December 04, 2013. Time of exam: 9:00 – 13:00 (4 hours). Date of grade assignment: January 06, 2014. Credits: 7.5 Permitted aids: Approved calculator. No printed text or handwritten notes permitted. (D). Attachments: 7 pages of questions, • The 35 exam questions and problems are divided into three parts, where each part is assigned an evaluation weight percentage of the total. The sequence of questions is probably, but not necessarily in your order of difficulty, so time your work and make sure you find time for all questions. Try to make succinct answers. Your best effort in making a comprehensible handwriting will be much appreciated. Good luck! TTM4137 Final Exam, Dec. 04, 2013 1 Part I. Wireless Networks Security Facts (50%) This part consists of 25 multiple choice questions. The assessment weight is equally distributed over all the questions in this part. Each question offers four possible answers, but only one is correct. Marking the correct answer results in 2 points, whereas double, wrong or missing mark result in zero. Multiple choice answers Candidate nr __________________ USE CAPITAL LETTERS! PLEASE FILL IN AND DELIVER THIS PAGE Nr. Answer Nr. Answer 1 14 2 15 3 16 4 17 5 18 6 19 7 20 8 21 9 22 10 23 11 24 12 25 13 TTM4137 Final Exam, Dec. 04, 2013 4 15. A simple description of MILENAGE functions can be done as: A. fi,K(x) = EK( EK(x xor ci) ); where i = 1,2,3,4,5, and ci are distinct constants B. fi,K(x) = EK( EK(x) xor ci); where i = 1,2,3,4,5, and ci are distinct constants C. fi,K(x) = EK( EK(ci) xor x); where i = 1,2,3,4,5, and ci are distinct constants D. fi,K(x) = EK( EK(x) ) xor ci ; where i = 1,2,3,4,5, and ci are distinct constants 16. Which two ciphers are used in UEA1 and UEA2 A. AES and KASUMI B. AES and RC4 C. AES and SNOW 3G D. KASUMI and SNOW 3G 17. In UMTS, the function f9( ) is used for: A. Integrity key generation B. Integrity protection C. Encryption key generation D. Encryption 18. Where is encryption located in the UMTS stack of protocols? A. In Physical Layer and Media Access Control Layer B. In Media Access Control Layer and Radio Link Control Layer C. In Radio Link Control Layer and Radio Resource Control Protocol D. In Radio Resource Control Protocol and Higher Layers 19. In UMTS, the security mechanisms employed between the Mobile Station and the Radio Network Controller are responsible for: A. Sequence Number Management B. Encryption and Integrity Protection C. User Authentication D. Network Authentication 20. In LTE, the Home Subscriber Server has the following information: A. policy control and decision-making rules, B. IP address allocation for the UE, C. buffer of downlink data while the MME paging, D. information about the PDNs. 21. In LTE, E-UTRAN is the part of the whole system infrastructure responsible for the: A. radio access network B. circuit switch core network C. packet switch core network D. evolved packet core network TTM4137 Final Exam, Dec. 04, 2013 5 22. How many security levels has LTE? A. 5 B. 4 C. 3 D. 2 23. The following component IS NOT a part of the RFID technology A. Transceiver – Tag Reader B. Transponder – RFID tag C. Antenna D. Infra Red Analog/Digital Converter 24. The EPCGen2 tag is A. A passive tag that allows just low-speed reading and sortation B. An Active tag that allows high-speed reading and sortation C. A passive tag that allows high-speed reading and sortation D. An Active tag that allows just low-speed reading and sortation 25. In RFID, the usual budget for implementation of the cryptographic primitives is: A. 100 – 200 gates B. 200 – 500 gates C. 500 – 1000 gates D. 200 – 2000 gates TTM4137 Final Exam, Dec. 04, 2013 6 Part II. Cryptographic Mechanisms (35%) Candidate nr __________________ PLEASE FILL IN AND DELIVER THIS PAGE 26. Which cipher is used in WEP? (3%) ________________________________________________________ 27. How big can be the key in WEP? (4%) ________________________________________________________ 28. What is the integrity check algorithm used in TKIP? (3%) ________________________________________________________ 29. What is the input data for the integrity check algorithm used in TKIP? (6%) ________________________________________________________ 30. Which cipher is used in RSN? (3%) ________________________________________________________ 31. What is achieved by AES-CCMP? (6%) ________________________________________________________ 32. The key derivation function used in LTE is HMAC. What is the definition of HMAC? (7%) ________________________________________________________ 33. Which hash function is used in the key derivation function of LTE? (3%) ________________________________________________________
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved