ExamGecko
Home / Nokia / BL0-100 / List of questions
Ask Question

Nokia BL0-100 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which one of the following requires a network service package defined in a catalog?

Cloud software platform
Cloud software platform
Cloud infrastructure software
Cloud infrastructure software
Cloud orchestration
Cloud orchestration
Software defined network
Software defined network
Suggested answer: C
asked 23/09/2024
Arvee Natividad
47 questions

Question 12

Report Export Collapse

What does the acronym SOAR stand for?

Security Orchestration Automation and Recovery
Security Orchestration Automation and Recovery
Security Optimization Accountability Recovery
Security Optimization Accountability Recovery
Security Orchestration Automation and Response
Security Orchestration Automation and Response
Securitization, Optimization, Access Control, and Resiliency
Securitization, Optimization, Access Control, and Resiliency
Suggested answer: C
Explanation:

Reference: https://www.fireeye.com/products/helix/what-is-soar.html

asked 23/09/2024
Raed Abu-Haija
42 questions

Question 13

Report Export Collapse

Which of the following is not a component of the 5G Flexible RAN architecture?

Radio Unit
Radio Unit
Distributed Unit
Distributed Unit
Centralized Unit
Centralized Unit
Optical Unit
Optical Unit
Suggested answer: D
Explanation:

Reference: https://www.hindawi.com/journals/wcmc/2019/5264012/

asked 23/09/2024
janet phillips
38 questions

Question 14

Report Export Collapse

A company is planning to offer services to different cities worldwide so drones can be used to scan disaster areas to help identify victims' locations quickly, organize evacuations efficiently, and save lives. Drones will be connected to a 5G network. The company is planning to offer two applications running in the cloud – one to manage drones through remote control while the other offers live video streaming to drone operators. As a 5G professional, you are asked what are the network requirements for those two applications?

The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.
The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.
The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.
The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.
Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.
Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.
The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.
The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.
Suggested answer: B
asked 23/09/2024
Wasawatt Ch
42 questions

Question 15

Report Export Collapse

What is the purpose of the secondary authentication feature?

To improve authentication between the User Equipment and the 5G Core.
To improve authentication between the User Equipment and the 5G Core.
To improve authentication when connecting to different network slices.
To improve authentication when connecting to different network slices.
To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
To authenticate the User Equipment with an external data network.
To authenticate the User Equipment with an external data network.
Suggested answer: A
asked 23/09/2024
Enrique Villegas
41 questions

Question 16

Report Export Collapse

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)

MU-MIMO and beamforming
MU-MIMO and beamforming
Higher spectral efficiency
Higher spectral efficiency
Network Slicing
Network Slicing
Multi-connectivity per User Equipment
Multi-connectivity per User Equipment
Suggested answer: A, B, C
asked 23/09/2024
Ibrahim Ramku
51 questions

Question 17

Report Export Collapse

What are the benefits of the stateless or state-efficient aspects of network functions?

Avoid massive database corruption
Avoid massive database corruption
Provide real time access to the databases
Provide real time access to the databases
Enable scalability and extreme resiliency in the 5G Core
Enable scalability and extreme resiliency in the 5G Core
Ensure the database integrity
Ensure the database integrity
Suggested answer: C
Explanation:

Reference: https://www.nokia.com/about-us/news/releases/2018/01/29/nokia-implements-futurex-network- architecture-for-5g-to-deliver-breakthrough-network-performance-and-reduce-costs/

asked 23/09/2024
jaimie lloyd
48 questions

Question 18

Report Export Collapse

Which of the following defines a vertical Network Slice?

When it serves a given customer for a specific purpose, such as a national energy network.
When it serves a given customer for a specific purpose, such as a national energy network.
When it cross all the network layers from the radio up to the core.
When it cross all the network layers from the radio up to the core.
When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy).
When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy).
When it operates on the same layer of the ISO/OSI model.
When it operates on the same layer of the ISO/OSI model.
Suggested answer: A
Explanation:

Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case- Requirements-_-FInal-.pdf

asked 23/09/2024
Paul Bryant
37 questions

Question 19

Report Export Collapse

What are the benefits of traffic engineering in Transport networks? (Choose three.)

Scaling access points
Scaling access points
Better utilization of network capacity
Better utilization of network capacity
Traffic steering
Traffic steering
Resiliency
Resiliency
Suggested answer: B, C, D
asked 23/09/2024
Tomas Ojeda
45 questions

Question 20

Report Export Collapse

Which of the following is a valid NFV attack?

Hijack attack on hypervisor
Hijack attack on hypervisor
DDoS attack on the SDN switches
DDoS attack on the SDN switches
Poor NFV implementation
Poor NFV implementation
Hypervisor resources leakage
Hypervisor resources leakage
Suggested answer: A
Explanation:

Reference: https://www.etsi.org/deliver/etsi_gs/nfv-sec/001_099/001/01.01.01_60/gs_nfvsec001v010101p.pdf

asked 23/09/2024
Daniel Martos
47 questions
Total 65 questions
Go to page: of 7

Related questions