【Answer】1. C 2. A 3. A 4. A 5. D
【Winner】hugu, AymanOT, Vien, be_lo, viettel
------------------------
Hello, everyone!
Join the Community Learning week IT class!
IT class learning time of this phase: June 7th – 12th.
Answer time of this class: June 10th, 2 AM - June 11th, 10 AM (UTC+0).
Class topic
Post 1. 【Introduction to 5G】5G security protection
Air interface encryption uses parameters that change regularly to convert sent data. When receiving data, the same parameters are used for inverse conversion to restore the data. In this way, the ciphertext is used for transmission over the radio interface to enhance data transmission security.. .…(more)
Post 2. [Introduction to 5G] 5G air interface main security threats and response
In a 5G network, the Uu port between the UE and gNodeB is a public open interface that can be used by attackers to attack the 5G network. what are the main 5G airdrop security threats? How to defend against the security threat of data eavesdropping and tampering?..…(more)
Post 3. 【Introduction to 5G】Introduction to EN-DC protocol architecture
Due to the early freeze of the EN-DC protocol, Option4 series and Option7 series was postponed to March 19.. .(more)
Post 4. 【Introduction to 5G】Introduction to DC and AC
DC was introduced in the 3GPP R12 phase LTE system and CA was introduced in 3GPP R10.… (more)
Post 5. Overview of 5G NSA networking and basic concepts
From LTE to NR, the deployment of the operator's network can not be achieved overnight, will go through many intermediate stages, and gradually evolve to NR's independent networking architecture, considering different radio access and core network arrangements and combinations,..… (more)
Class Q&As
After attending this class, please answer the following questions and comment with the answers below this post.
1. (Single-Answer Question)The gNodeB calculates the encryption key based on the root key stored in what?
A. USIM
B. SIM
C. UDM
D. DUM
2. (Single-Answer Question) What symbols are encrypted into subscription covert identifiers (SUCI) for transmission on 5G networks to defend against pseudo base station attacks?
A. SUPI
B. SUDI
C. IMSI
D. NAI
3. (Single-Answer Question) In NSA networks, the so-called non-independence is mainly for the control plane. What devices do all control plane signaling rely on for forwarding?
A. eNodeB
B. UE
C. gNodeB
D. EN-DC
4. (Single-Answer Question)EN-DC is between LTE and NR, who is the primary base station and who is the secondary base station?
A. LTE, 5G
B. 5G, LTE
C. 4G, 5G
D. 5G,4G
5. (Single-Answer Question) The next generation eNodeB provides 4G control-plane and user-plane nodes for UEs and connects to the 5GC through what interface?
A. 5G
B. LTE
C. 5GC
D. NG
Hope you get good grades, come on! 
Click to learn: >>>previous class – Server

![IT class - June 10th [Community Learning Week[Phase 3]-3964635-1](static/image/smiley/default/handshake.gif)

