ExamGecko
Home Home / Nokia / BL0-100

Nokia BL0-100 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Which of the following is not a component of a 5G Transport network?

A.
TDM Network
A.
TDM Network
Answers
B.
IP Network
B.
IP Network
Answers
C.
Access Backhaul
C.
Access Backhaul
Answers
D.
Optical Transport
D.
Optical Transport
Answers
Suggested answer: A

Which of the following industries are the most digitized today?

A.
Transport and Health
A.
Transport and Health
Answers
B.
Robotics and Media
B.
Robotics and Media
Answers
C.
Factories and Transport
C.
Factories and Transport
Answers
D.
Media and Commerce
D.
Media and Commerce
Answers
Suggested answer: D

What will 5G bring in terms of supporting requirements of industry automation? (Choose three.)

A.
Low latency characteristics in the range of 5 to 10 ms for High Speed Discrete Automation Applications.
A.
Low latency characteristics in the range of 5 to 10 ms for High Speed Discrete Automation Applications.
Answers
B.
Low latency characteristics in the range of 0.1 to 1 ms for Video Monitoring and AR.
B.
Low latency characteristics in the range of 0.1 to 1 ms for Video Monitoring and AR.
Answers
C.
Low latency characteristics in the range of 100 to 200 ms for Remote Control Tele-operation Applications.
C.
Low latency characteristics in the range of 100 to 200 ms for Remote Control Tele-operation Applications.
Answers
D.
Low latency characteristics in the range of 50 to 100 ms for Discrete and Process Automation Applications.
D.
Low latency characteristics in the range of 50 to 100 ms for Discrete and Process Automation Applications.
Answers
Suggested answer: A, C, D

Explanation:

Reference: https://www.symmetryelectronics.com/blog/how-will-5g-transform-industrialiot/#:~:text=5G%20Technology%20Enables%20Industry%204.0%20Integration&text=For%20applications%20in%20industrial%20automation,power%20necessary%20for%20industrial%20control

What is the Network Repository Function (NRF)?

A.
This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized - unstructured — data.
A.
This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized - unstructured — data.
Answers
B.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
B.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
Answers
C.
This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
C.
This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
Answers
D.
This network function provides registration and discovery functionality to enable other network functions/services to discover and communicate with each other.
D.
This network function provides registration and discovery functionality to enable other network functions/services to discover and communicate with each other.
Answers
Suggested answer: C

Which deployment option is used by initially deployed 5G non-standalone networks?

A.
Option 4
A.
Option 4
Answers
B.
Option 2
B.
Option 2
Answers
C.
Option 3x
C.
Option 3x
Answers
D.
Option 7
D.
Option 7
Answers
Suggested answer: B

What is the Authentication Server Function (AUSF)?

A.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
A.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
Answers
B.
This network function supports authentication for 3GPP and non-3GPP accesses.
B.
This network function supports authentication for 3GPP and non-3GPP accesses.
Answers
C.
This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
C.
This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
Answers
D.
This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
D.
This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
Answers
Suggested answer: B

A rental car company wants to offer a service to their clients where the renter can leave a self-driving car wherever they want when the rental period is up. A company operator will then remotely drive the left vehicles back to the rental location. Where should the application for remote car control and driving reside and why?

A.
It should run in the central cloud as latency is not very important here. Reliability is guaranteed by the central cloud.
A.
It should run in the central cloud as latency is not very important here. Reliability is guaranteed by the central cloud.
Answers
B.
The application should run in the central cloud, with very high access throughput to support low latency.
B.
The application should run in the central cloud, with very high access throughput to support low latency.
Answers
C.
It should be installed locally on the car computer and the company operator should remotely connect to it. This approach is more secure.
C.
It should be installed locally on the car computer and the company operator should remotely connect to it. This approach is more secure.
Answers
D.
It should be running in the edge cloud because latency is very important for the remote control of vehicles in motion and also for reliability purposes.
D.
It should be running in the edge cloud because latency is very important for the remote control of vehicles in motion and also for reliability purposes.
Answers
Suggested answer: D

SOAR can be seen as a tool for which of the following? Select the best answer.

A.
SDN intrusion control
A.
SDN intrusion control
Answers
B.
NFV overload control
B.
NFV overload control
Answers
C.
Security Operation Center
C.
Security Operation Center
Answers
D.
IoT attack prevention
D.
IoT attack prevention
Answers
Suggested answer: D

Which standards organization defines the EAP protocol?

A.
IETF
A.
IETF
Answers
B.
ITU
B.
ITU
Answers
C.
ETSI
C.
ETSI
Answers
D.
3GPP
D.
3GPP
Answers
Suggested answer: A

Explanation:

Reference: https://www.techtarget.com/searchsecurity/definition/Extensible-Authentication-Protocol-EAP

Many 5G use cases require the network to provide very high capacity in the order of 10 Gb/s. What are the 3 different methods that can be used to increase capacity in the wireless interface?

A.
more cells bigger cells more spectrum
A.
more cells bigger cells more spectrum
Answers
B.
more cells high energy more antennas
B.
more cells high energy more antennas
Answers
C.
more spectrum high spectral efficiency higher cell density
C.
more spectrum high spectral efficiency higher cell density
Answers
D.
use higher spectrum bands restrict number of devices connected wirelessly bigger cells
D.
use higher spectrum bands restrict number of devices connected wirelessly bigger cells
Answers
Suggested answer: C
Total 65 questions
Go to page: of 7