Got it

IT class - June 10th [Community Learning Week[Phase 3] Activity

END Latest reply: Jun 11, 2021 14:43:40 1528 46 12 0 1

【Answer】1. C    2. A    3. A    4. A    5. D

【Winner】hugu, AymanOT, Vien, be_lo, viettel

------------------------

Hello, everyone!

Join the Community Learning week IT class! 

learning week IT class

IT class learning time of this phase: June 7th –  12th.

Answer time of this class: June 10th, 2 AM - June 11th, 10 AM (UTC+0).

Class topic

Post 1. 【Introduction to 5G】5G security protection

Air interface encryption uses parameters that change regularly to convert sent data. When receiving data, the same parameters are used for inverse conversion to restore the data. In this way, the ciphertext is used for transmission over the radio interface to enhance data transmission security.. .…(more)

Post 2.  [Introduction to 5G] 5G air interface main security threats and response

In a 5G network, the Uu port between the UE and gNodeB is a public open interface that can be used by attackers to attack the 5G network. what are the main 5G airdrop security threats? How to defend against the security threat of data eavesdropping and tampering?..…(more)

Post 3. 【Introduction to 5G】Introduction to EN-DC protocol architecture

Due to the early freeze of the EN-DC protocol, Option4 series and Option7 series was postponed to March 19.. .(more)

Post 4. 【Introduction to 5G】Introduction to DC and AC

DC was introduced in the 3GPP R12 phase LTE system and CA was introduced in 3GPP R10.… (more)

Post 5. Overview of 5G NSA networking and basic concepts

From LTE to NR, the deployment of the operator's network can not be achieved overnight, will go through many intermediate stages, and gradually evolve to NR's independent networking architecture, considering different radio access and core network arrangements and combinations,..… (more)

Class Q&As

After attending this class, please answer the following questions and comment with the answers below this post.

1. (Single-Answer Question)The gNodeB calculates the encryption key based on the root key stored in what?

A. USIM

B. SIM

C. UDM

D. DUM

2. (Single-Answer Question) What symbols are encrypted into subscription covert identifiers (SUCI) for transmission on 5G networks to defend against pseudo base station attacks?

A. SUPI

B. SUDI

C. IMSI

D. NAI

3. (Single-Answer Question) In NSA networks, the so-called non-independence is mainly for the control plane. What devices do all control plane signaling rely on for forwarding? 

A. eNodeB

B. UE

C. gNodeB

D. EN-DC

4. (Single-Answer Question)EN-DC is between LTE and NR, who is the primary base station and who is the secondary base station?

A. LTE, 5G

B. 5G, LTE

C. 4G, 5G

D. 5G,4G

5. (Single-Answer Question) The next generation eNodeB provides 4G control-plane and user-plane nodes for UEs and connects to the 5GC through what interface?

A. 5G

B. LTE

C. 5GC

D. NG


Hope you get good grades, come on! t_0003.gif

Click to learn:  >>>previous class – Server 


The post is synchronized to:  Learning Week

  • x
  • convention:

IT class - June 10th [Community Learning Week[Phase 3]-3964635-1
View more
  • x
  • convention:

1-C
2-A
3-A
4-A
5-D

View more
  • x
  • convention:

1. C
2. A
3. A
4. A
5. D
View more
  • x
  • convention:

Q#1. C
Q#2. A
Q#3. D
Q#4. A
Q#5. D
View more
  • x
  • convention:

NICE
View more
  • x
  • convention:

E.DR_91
MVE Author Created Jun 10, 2021 06:37:22

1. C. UDM
2. A. SUPI
3. A. eNodeB
4. A. LTE, 5G
5. B. LTE






View more
  • x
  • convention:

Phase 3]
IT Class: June 7th-June 12th
Learning post>>> No1.
10th

1 C
2 A
3 D
4 A
5 D

View more
  • x
  • convention:

1.C
2.A
3.A
4.C
5.D

View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.