Remember
Register
1
new
Chill
new
Puzzles
new
GK
new
Sports
new
Business
Home
Questions
MCQs
Unanswered
Tags
Users
Ask a Question
Write Article
Articles
Connect to us
Post under tag security
Recent posts under tag security
All
Questions
MCQs
Jobs
Articles
+1
vote
Exam Dumps & Practice Tests – Your Best Preparation Tools for CompTIA Security+ Certification Exam
posted
Sep 8, 2020
by
Divya Bharti
education
security
–1
vote
Prepaway - Revealed: The Easiest Way to Attain (ISC)² CISSP Certification
posted
May 16, 2019
by
Rahul Vaidya
security
network security
prepaway
+1
vote
0
answers
5G: What is IPsec ESP and IKEv2 certificate based authentication and how it is being used for the 5G network ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
core network
ran
+1
vote
0
answers
5G: What is multiple active NAS connection concept in 5G network and when an UE would have such multiple connection ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
nas
core network
+1
vote
1
answer
5G: What's role SIDF play in the 5G network ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
core network
+1
vote
0
answers
5G: In which scenarios, Integrity protection would be enabled between UE and gNB for the user data ?
posted
Feb 16, 2018
by
Harshita
5g
lte
security
ue
gnb
0
votes
0
answers
5G: How does 5G Authentication and Key Agreement (5G-AKA) work ?
posted
Feb 13, 2018
by
Harshita
5g
security
ue
nas
rrc
+1
vote
0
answers
In general when an integrity protection is becomes mandatory and when encryption becomes mandatory ?
posted
Oct 12, 2017
by
anonymous
encryption
security
interview questions
+2
votes
0
answers
In LTE, why the integrity and encryption protection order is different in NAS and AS layer?
posted
Oct 12, 2017
by
anonymous
lte
security
encryption
0
votes
1
answer
What is Spring Security?
posted
Sep 21, 2017
by
anonymous
java
spring
security
interview questions
+2
votes
1
answer
what is the difference between Cyber security and Network security?
posted
Mar 3, 2017
by
Bheemalinga Reddy B
network security
security
+3
votes
1
answer
About UE support UMTS
posted
Jan 20, 2017
by
Jim Tan
lte
ue
umts
security
+1
vote
0
answers
LTE: How the different set of keys are generated to receive the security protected MBMS services ?
posted
Oct 24, 2016
by
Rupam
lte
mbms
security
bmsc
+1
vote
2
answers
LTE: How data of MBMS services are protected ?
posted
Oct 22, 2016
by
Rupam
lte
mbms
security
+1
vote
1
answer
LTE: What is the security gateway and where it is used in the LTE network ?
posted
Sep 30, 2016
by
Rupam
lte
security
network security
0
votes
0
answers
What is a DoS attack and how can it be prevented?
posted
Jun 27, 2016
by
anonymous
security
+7
votes
Be Aware and get Known before you get Arrested
posted
Apr 20, 2016
by
Atindra Kumar Nath
web security
security
cybercrime
+3
votes
You can be Hacker by fooling your's pal.
posted
Feb 25, 2016
by
Chandan Kumar Pandey
security
web
web security
web designing
+2
votes
1
answer
LTE : What is the difference between "partial native" and "full native " NAS security context ?
posted
Feb 21, 2016
by
Harshita
lte
security
+1
vote
0
answers
LTE : I came to know that integrity and ciphering order for RRC and NAS level are reverse to each other ?
posted
Feb 21, 2016
by
Harshita
lte
security
+2
votes
1
answer
LTE: What is the difference between Algo ID and Algo distinguisher while generating security keys ?
posted
Feb 19, 2016
by
Harshita
lte
security
nas
+3
votes
1
answer
LTE: How does LTE security key derivation way differ for the S1 and X2 handover ?
posted
Dec 27, 2015
by
Harshita
lte
handover
security
+1
vote
0
answers
LTE : What does NAS Key Set Identifier convey ?
posted
Dec 24, 2015
by
Ganesh Kumar
lte
ue
nas
security
+4
votes
1
answer
LTE: How does authentication procedure work for the LTE network and why it is required ?
posted
Dec 22, 2015
by
Vikram Singh
lte
ue
nas
security
authentication
+3
votes
0
answers
LTE: Does the serving PLMN play any role while deriving authentication and security keys ?
posted
Dec 16, 2015
by
Harshita
lte
security
+1
vote
4
answers
Why we need Two types of Security modes (NAS,AS) in LTE
posted
Oct 9, 2015
by
Mallikharjuna Reddy
lte
security
nas
rrc
ue
+1
vote
Software Engineer at Intel Security (McAfee)
posted
Feb 24, 2015
by
anonymous
.net
asp.net
javascript
security
+3
votes
0
answers
Why there is 2 level of security as NAS and AS in LTE?
posted
Feb 6, 2015
by
Rajib Samui
lte
security
rrc
nas
+2
votes
0
answers
Why there is separate NAS Security procedure in LTE while it is not in UMTS?
posted
Jan 7, 2015
by
anonymous
security
lte
+3
votes
1
answer
Why security Mode Complete message is integrity protected but unciphered in RRC ?
posted
Dec 15, 2014
by
Gnanendra Reddy
lte
rrc
enodeb
security
+2
votes
1
answer
Can anybody give example of Security Mode Command NAS LTE protocol for null integrity algo?
posted
Dec 4, 2014
by
Aleks Asvaldov
lte
security
+3
votes
1
answer
What is kerberos protocol?
posted
Nov 27, 2014
by
Vrije Mani Upadhyay
networking
security
+2
votes
1
answer
What is PIX firewall security? How does it differ from a firewall?
posted
Nov 13, 2014
by
Vrije Mani Upadhyay
networking
firewall
security
+5
votes
1
answer
Security issues about retransmitted packets in LTE
posted
Oct 25, 2014
by
Shashikant Chaudhari
lte
security
+3
votes
2
answers
How LTE security is implemented and which are the nodes got involved in it?
posted
Oct 20, 2014
by
Vikram Luthra
lte
security
+4
votes
1
answer
Why Network Time Synchronization is important?
posted
Oct 7, 2014
by
Vrije Mani Upadhyay
networking
security
+2
votes
1
answer
what is Certificate issued by Certificate Authority (CA)?
posted
Sep 30, 2014
by
Bheemappa G
security
ipsec
son
+1
vote
1
answer
Use of Integrity protection in LTE?
posted
Jul 7, 2014
by
Yogeshwar Thakur
lte
integrity
security
0
votes
1
answer
LTE: What does AMF signify ?
posted
Jun 24, 2014
by
Neelam
lte
mme
security
0
votes
1
answer
LTE: What are all KDF used in LTE ?
posted
Jun 19, 2014
by
Harshita
lte
enodeb
mme
security
+2
votes
Networking Engineer Jobs by iQuest Consultants
posted
Jun 11, 2014
by
anonymous
networking
security
juniper
cisco
+1
vote
2
answers
Why do we have these EPS security context: Native and mapped contexts?
posted
May 20, 2014
by
Kapil Kapoor
eps
lte
security
+4
votes
Shall LTE broadband replace public-safety, Land Mobile Radio voice systems in 3-5 years?
posted
Apr 21, 2014
by
Divya Bharti
lte
security
+5
votes
1
answer
How H(e)NB are authenticated in LTE/SAE?
posted
Apr 12, 2014
by
Hafeth Dawbaa
lte
aka
security
authentication
henb
+4
votes
1
answer
LTE : NAS security mode command , how to form a final message M that is given as input to AES_CMAC function.?
posted
Apr 9, 2014
by
Bheemappa G
lte
security
+9
votes
1
answer
Access Stratum Security Activation Procedure?
posted
Apr 2, 2014
by
Hiteshwar Thakur
lte
enodeb
security
ue
+3
votes
3
answers
EPS authentication, please explain?
posted
Apr 1, 2014
by
Hafeth Dawbaa
eps
authentication
lte
security
aka
+8
votes
1
answer
LTE: Difference between "SNOW 3G" and "AES" algorithms ?
posted
Feb 1, 2014
by
Vikram Singh
lte
security
mme
+2
votes
1
answer
LTE: How does integrity verification is performed by receiving PDCP entity ?
posted
Dec 18, 2013
by
Harshita
pdcp
ue
enodeb
lte
security
+2
votes
0
answers
LTE: How Kenb* being generated ?
posted
Dec 12, 2013
by
Harshita
lte
enodeb
ue
security
Page:
1
2
next »
...