SCM - Quiz 3

SCM - Quiz 3

1st Grade

10 Qs

quiz-placeholder

Similar activities

TADA Awareness Training Quiz

TADA Awareness Training Quiz

1st - 3rd Grade

10 Qs

tikom kelas 2

tikom kelas 2

1st Grade

10 Qs

peralatan dan perlengkapan kantor

peralatan dan perlengkapan kantor

1st - 3rd Grade

10 Qs

ISMS ISO 27001 Post Test

ISMS ISO 27001 Post Test

1st - 4th Grade

10 Qs

Six Pillars of Character

Six Pillars of Character

KG - University

7 Qs

GUESS THE PICTURE WORDS

GUESS THE PICTURE WORDS

KG - 1st Grade

10 Qs

TEL22-IOT

TEL22-IOT

1st - 5th Grade

11 Qs

SCM - Quiz 3

SCM - Quiz 3

Assessment

Quiz

Other

1st Grade

Medium

Created by

Nor Syafiqah

Used 29+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify FOUR [4] main components to describe the GSM network architecture.

SIM, MS, BTS and BCS

MS, BSS, NSS and OSS

BTS, BCS, MSC, MS

BSS, NSS, OMC, OSS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the right components for GSM architecture that consists of the hardware or physical equipment such as digital signal processors, radio transceiver, display, battery, case and SIM card.

Mobile Station

Base Station Subsystem

Subscriber Identity Module

Network Switching Subsystem

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify a type of threats correlated to natural disaster as threat area.

Confidentiality

Availability

Aviation

Integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classify the right correlation of threats to human categories based on the threats area involving theft, sabotage, vandalism or physical Intrusions.

Integrity

Confidentiality

Integrity and Availability

Confidentiality, Integrity and Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the right term refers to a variety of malicious programs such as adware, bots, bugs, rootkits, spyware, trojan horses, viruses and worms.

Malware

Scareware

Anti-Malware

Malwarebytes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the security problem with GSM when the attacker can send the CHANNEL REQUEST message to the BSC for several times but he/she does not complete the protocol and requests another signalling channel.

Man-in-the-middle attack

Over-the-air cracking

Leaking the user anonymity

Vulnerability to the DoS attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Determine one symptom is NOT TRUE when your mobile device infected by malicious Software

Freezing or crashing

Increased CPU Speeds

Modified or deleted files

Strange mobile behaviour

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?