ExamGecko
Home Home / Nokia / BL0-220

Nokia BL0-220 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Which of the following statements are correct regarding the characteristics of microservices? (Select 2)

A.
Microservices are chained in order to build an application.
A.
Microservices are chained in order to build an application.
Answers
B.
All functions are the same in microservices.
B.
All functions are the same in microservices.
Answers
C.
Monolithic applications breaks functions in small pieces called microservices.
C.
Monolithic applications breaks functions in small pieces called microservices.
Answers
D.
Microservices are limited to 10 per application.
D.
Microservices are limited to 10 per application.
Answers
Suggested answer: A, C

Explanation:

Microservices are a design principle for cloud-native applications, where each application is composed of a set of small, independent, and loosely coupled services that communicate with each other through well-defined interfaces1.Microservices have the following characteristics2:

Microservices arechainedin order to build an application, meaning that they are connected by a network and exchange messages or data to perform a specific function or task.

Microservices aredifferentiatedby function, meaning that each microservice has a single responsibility and performs a distinct function within the application.

Microservices arederivedfrom monolithic applications, meaning that they are created by breaking down a large and complex application into smaller and simpler pieces that can be developed, deployed, and scaled independently.

Microservices arescalableandresilient, meaning that they can handle variable workloads and recover from failures without affecting the whole application.

Therefore, the correct statements are A and C, while B and D are incorrect.Reference:1:Nokia Bell Labs Distributed Cloud Networks, Unit 2: Cloud Technologies and Features, Topic: Microservices and Containerization2:Module by Module - Self Study Note Guide, DC2.4-- Microservices and Containerization

Select the best option below to complete the following sentence. Multi-tenancy network connectivity provides dedicated resources through_____

A.
Hardware allocation
A.
Hardware allocation
Answers
B.
Network Slicing
B.
Network Slicing
Answers
C.
Dedicated networks
C.
Dedicated networks
Answers
D.
Configurable Networks
D.
Configurable Networks
Answers
Suggested answer: B

Explanation:

Multi-tenancy network connectivity provides dedicated resources throughnetwork slicing. Network slicing is a technique that allows operators to create multiple logical networks over a shared physical infrastructure. Each network slice can have its own characteristics, such as bandwidth, latency, security, and quality of service, to meet the specific requirements of different applications and customers. Network slicing enables operators to offer customized and differentiated services to various tenants, such as enterprises, industries, and public sector organizations, while optimizing the utilization of network resources. Network slicing is one of the key features of 5G networks, as it supports the diverse and dynamic use cases of 5G, such as enhanced mobile broadband, massive machine-type communications, and ultra-reliable low-latency communications.Reference:Nokia Bell Labs 5G Professional Certification - Distributed Cloud Networks, Unit 4: Operating Your Cloud, Section 4.2: Network Slicing.

Select the best option below to complete the following sentence.

The E2E Orchestrator for VMs is the same as_____for containers.

A.
Infrastructure as a Service
A.
Infrastructure as a Service
Answers
B.
Containers as a Service
B.
Containers as a Service
Answers
C.
Software as a service
C.
Software as a service
Answers
D.
Platform as a Service
D.
Platform as a Service
Answers
Suggested answer: B

Explanation:

Containers as a Service (CaaS) is the same as the E2E Orchestrator for VMs for containers. CaaS is a cloud service model that allows users to deploy and manage containerized applications on a cloud platform. CaaS provides the necessary infrastructure, orchestration, networking, and security for running containers. The E2E Orchestrator for VMs is a Nokia solution that provides similar capabilities for virtual machines (VMs). The E2E Orchestrator for VMs enables the creation, deployment, and management of VMs on a distributed cloud platform. It also supports network slicing, security, and automation features.

Nokia Bell Labs 5G Professional Certification - Distributed Cloud Networks, Unit 2: Cloud Technologies and Features, slide 19

Nokia Cloud Platform, paragraph 1

Nokia Bell Labs End-to-End 5G Certification, page 4

What is the primary benefit of an Edge Cloud?

A.
Low latency
A.
Low latency
Answers
B.
Low Cost
B.
Low Cost
Answers
C.
Large Bandwidth
C.
Large Bandwidth
Answers
D.
High Availability
D.
High Availability
Answers
Suggested answer: A

Explanation:

Low latency is the primary benefit of an Edge Cloud.Edge Cloud is a distributed cloud architecture that brings cloud resources closer to the end users and devices, reducing the distance and delay for data transmission1.Low latency is crucial for many 5G use cases that require real-time responsiveness, such as autonomous driving, remote surgery, smart manufacturing, etc2.Low cost, large bandwidth, and high availability are not the primary benefits of an Edge Cloud, although they may be achieved depending on the deployment scenario and the service level agreement.Reference:1: Nokia Bell Labs Distributed Cloud Networks, Unit 1: Cloud Ecosystem, Section 1.2: Cloud Types2: Nokia Bell Labs Distributed Cloud Networks, Unit 5: New Services Automation, Section 5.1: Industry 4.0 Use Cases

What are the main parameters of policy-based auto-scaling? (Select 2)

A.
Threshold
A.
Threshold
Answers
B.
Min/max values
B.
Min/max values
Answers
C.
Priority
C.
Priority
Answers
D.
Description
D.
Description
Answers
Suggested answer: A, B

Explanation:

The main parameters of policy-based auto-scaling arethresholdandmin/max values.Threshold is the value of a metric that triggers the scaling action, such as CPU utilization or memory usage1.Min/max values are the minimum and maximum number of instances or resources that can be scaled up or down1. Priority and description are not parameters of policy-based auto-scaling.Priority is the order of execution of policies in case of conflicting or overlapping conditions2.Description is the optional text that provides additional information about the policy2.Reference:1:Nokia Bell Labs Distributed Cloud Networks, Unit 4: Operating Your Cloud, slide 242:Nokia CloudBand Application Manager User Guide, Chapter 9: Scaling Policies, page 151

Select the best option below to complete the following sentence.

Different paths for a NF providing Cloud Resilience are defined in a_____?

A.
Network Function template
A.
Network Function template
Answers
B.
Network Service Descriptor
B.
Network Service Descriptor
Answers
C.
NS Orchestrator configuration
C.
NS Orchestrator configuration
Answers
D.
NFV Orchestrator configuration
D.
NFV Orchestrator configuration
Answers
Suggested answer: B

Explanation:

Different paths for a NF providing Cloud Resilience are defined in aNetwork Service Descriptor. A Network Service Descriptor (NSD) is a document that describes the topology, configuration, and requirements of a network service.It specifies the network functions (NFs) that compose the service, the virtual links that connect them, and the forwarding graphs that define the traffic flows between them1.A NSD also defines the resilience policies for each NF, such as the number of instances, the scaling triggers, the fault management actions, and the alternative paths in case of failures2. A Network Function template, an NS Orchestrator configuration, and an NFV Orchestrator configuration are not the correct options to complete the sentence.A Network Function template is a document that describes the characteristics and requirements of a single network function, such as the virtualization environment, the resources, the interfaces, and the dependencies1.An NS Orchestrator configuration is a set of parameters that control the behavior and operation of the NS Orchestrator, which is a component that manages the lifecycle of network services3.An NFV Orchestrator configuration is a set of parameters that control the behavior and operation of the NFV Orchestrator, which is a component that coordinates the allocation and release of resources for network services3.Reference:1: Nokia Bell Labs Distributed Cloud Networks, Unit 3: Cloud Resource Planning, Section 3.2: Network Function2: Nokia Bell Labs Distributed Cloud Networks, Unit 3: Cloud Resource Planning, Section 3.3: Network Service Descriptor Role3: Nokia Bell Labs Distributed Cloud Networks, Unit 4: Operating Your Cloud, Section 4.1: Industry Trends in Data Center Hardware

Cloud resource management provides which of the following? (Select 2)

A.
Management of the resources quota.
A.
Management of the resources quota.
Answers
B.
Best effort communication for all tenants.
B.
Best effort communication for all tenants.
Answers
C.
The ability to scale resources up and down.
C.
The ability to scale resources up and down.
Answers
D.
Resources when available.
D.
Resources when available.
Answers
Suggested answer: A, C

Explanation:

Cloud resource management provides management of the resources quota and the ability to scale resources up and down. Resource quota is the limit on the amount of resources that a tenant can use in a cloud environment, such as CPU, memory, storage, network, etc. Resource quota helps to prevent overconsumption of resources by a single tenant and to ensure fair allocation of resources among multiple tenants. The ability to scale resources up and down means that the cloud can dynamically adjust the amount of resources allocated to a tenant based on the demand and availability. Scaling resources up and down helps to optimize the performance and efficiency of the cloud, as well as to reduce the cost and waste of resources.Reference:Nokia Bell Labs Distributed Cloud Networks,Cloud Resource Planning

AI/ML based operation requires which of the follow? (Select 3)

A.
Pre-defined policies
A.
Pre-defined policies
Answers
B.
Open APIs
B.
Open APIs
Answers
C.
Standard Protocols
C.
Standard Protocols
Answers
D.
Closed loop automation
D.
Closed loop automation
Answers
Suggested answer: A, B, D

Explanation:

Closed loop automation Comprehensive Explanation and Reference of Correct Answer: AI/ML based operation requires pre-defined policies, open APIs, and closed

Nokia Bell Labs 5G Professional Certification - Distributed Cloud Networks | Nokia Distributed Cloud Networks, Unit 4: Operating Your Cloud, slide 7

Nokia, A1 and Microsoft deploy industry's first 5G edge cloud network slicing solution for enterprises | Nokia, paragraph 4

What event will trigger the auto-healing operation?

A.
Threshold
A.
Threshold
Answers
B.
Warning message
B.
Warning message
Answers
C.
New status
C.
New status
Answers
D.
Fault detection
D.
Fault detection
Answers
Suggested answer: D

Explanation:

A fault detection event will trigger the auto-healing operation.Auto-healing is a feature of cloud networks that enables the automatic recovery of resources or services from failures or errors1.Fault detection is the process of identifying and locating faults in the network using various methods such as monitoring, logging, or testing2.When a fault is detected, the auto-healing operation will initiate the appropriate actions to restore the normal functioning of the network, such as restarting, repairing, or replacing the faulty components1. Threshold, warning message, and new status are not events that trigger the auto-healing operation.Threshold is a predefined value or limit that indicates the acceptable performance or behavior of a resource or service3.Warning message is a notification or alert that informs the user or operator about a potential problem or risk in the network4. New status is a change or update in the state or condition of a resource or service, such as active, inactive, or degraded.

Select the best option below to complete the following sentence.

The_________is used to orchestrate and manage traffic through VNFs.

A.
Virtual Link
A.
Virtual Link
Answers
B.
VNF Forwarding Graph
B.
VNF Forwarding Graph
Answers
C.
Network Forwarding Path.
C.
Network Forwarding Path.
Answers
D.
Connection Point
D.
Connection Point
Answers
Suggested answer: B

Explanation:

The best option to complete the sentence isVNF Forwarding Graph.A VNF Forwarding Graph (VNF-FG) is a logical representation of a network service that consists of a set of interconnected Virtual Network Functions (VNFs) and the traffic flows between them1.The VNF-FG is used to orchestrate and manage traffic through VNFs by specifying the order and the requirements of the VNFs that need to be traversed by the traffic2.The VNF-FG also defines the connection points, virtual links, and network forwarding paths that are involved in the service delivery3.Reference:1:VNF Forwarding Graph and Network Service-Beginner's Guide, Introduction2:A survey of VNF forwarding graph embedding in B5G/6G networks - Springer, Section 13:A Deep Reinforcement Learning Approach for VNF Forwarding Graph Embedding, Section I

Total 60 questions
Go to page: of 6