Which of the following security technologies are used on a 5G network? -MC
A . End-to-end security protection between PLMNs.
B . 256-bit encryption algorithm.
C . Integrity protection on the user plane over the air interface.
D . Encrypted IMSI transmission.
Answer: A, B, C, D