ExamGecko
Home Home / Nokia / BL00100-101-E

Nokia BL00100-101-E Practice Test - Questions Answers

Question list
Search
Search

What is the Unstructured Data Storage Function (UDSF)?

A.
This network function exposes 5G Core Network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
A.
This network function exposes 5G Core Network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
Answers
B.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
B.
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
Answers
C.
This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized – Unstructured – data.
C.
This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized – Unstructured – data.
Answers
D.
This network function stores or retrieves subscriptions, profiles, and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.Answer: C
D.
This network function stores or retrieves subscriptions, profiles, and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.Answer: C
Answers
Suggested answer: C

Which of the following best defines what is meant by Network Slice isolation?

A.
Security + Cloud isolation
A.
Security + Cloud isolation
Answers
B.
Resource + Security isolation
B.
Resource + Security isolation
Answers
C.
Transport + Cloud isolation
C.
Transport + Cloud isolation
Answers
D.
Resource + Traffic isolationAnswer: B
D.
Resource + Traffic isolationAnswer: B
Answers
Suggested answer: B

Resource elasticity in Cloud enables which of the following actions? (Choose two.)

A.
Relocate VMs between data centers when a fault is detected.
A.
Relocate VMs between data centers when a fault is detected.
Answers
B.
Deploy VMs across data centers when a new slice is needed.
B.
Deploy VMs across data centers when a new slice is needed.
Answers
C.
Add resources to existing VMs when traffic is high.
C.
Add resources to existing VMs when traffic is high.
Answers
D.
Add VMs when traffic is high.
D.
Add VMs when traffic is high.
Answers
Suggested answer: A, D

Which of the following is not a part of an E2E Network Slice?

A.
Cloud Slice
A.
Cloud Slice
Answers
B.
Core Slice
B.
Core Slice
Answers
C.
Access Slice
C.
Access Slice
Answers
D.
Transport Slice
D.
Transport Slice
Answers
Suggested answer: A

What is the maximum distance of an Edge Cloud from end-user?

A.
1,000 KM
A.
1,000 KM
Answers
B.
5,000 KM
B.
5,000 KM
Answers
C.
10,000 KM
C.
10,000 KM
Answers
D.
300 KM
D.
300 KM
Answers
Suggested answer: A

You and a colleague are discussing the challenges to be resolved in order to make digitization and automation a reality in all industries. He is arguing that the solution is to have faster access connectivity, but you don't agree. You are trying to convince him of the need for an end-to-end solution. The new 5G network should be built end-to-end to enable industries' quest for value. What arguments can you provide to support your position?

A.
Increasing throughput is not enough. A faster and automated transport network, a distributed cloud where applications would run depending on their latency and reliability requirements, a core network that automatically handles any type of access, and a security framework to guarantee the security in every layer of the network are also needed.
A.
Increasing throughput is not enough. A faster and automated transport network, a distributed cloud where applications would run depending on their latency and reliability requirements, a core network that automatically handles any type of access, and a security framework to guarantee the security in every layer of the network are also needed.
Answers
B.
The network consists of many layers that include access, transport, core, cloud, and all of the applications running in the cloud. Increasing throughput in access is not enough. The bit rate needs to be increased in all of the other layers as well.
B.
The network consists of many layers that include access, transport, core, cloud, and all of the applications running in the cloud. Increasing throughput in access is not enough. The bit rate needs to be increased in all of the other layers as well.
Answers
C.
Increasing the access throughput might be worthwhile but applications that support a higher bit rate should also be a consideration.
C.
Increasing the access throughput might be worthwhile but applications that support a higher bit rate should also be a consideration.
Answers
D.
Increasing the throughput is enough. There is no need to change the network end-to-end.
D.
Increasing the throughput is enough. There is no need to change the network end-to-end.
Answers
Suggested answer: A

What is the main benefit of Cloud RAN?

A.
Increased cell coverage
A.
Increased cell coverage
Answers
B.
Better latency
B.
Better latency
Answers
C.
Reduced cost by centralizing some radio functionalities
C.
Reduced cost by centralizing some radio functionalities
Answers
D.
Increase radio throughputAnswer: D
D.
Increase radio throughputAnswer: D
Answers
Suggested answer: D

What is the primary benefit of Edge Cloud?

A.
Lower latency
A.
Lower latency
Answers
B.
Higher Availability
B.
Higher Availability
Answers
C.
Larger Bandwidth
C.
Larger Bandwidth
Answers
D.
Lower CostAnswer: A
D.
Lower CostAnswer: A
Answers
Suggested answer: A

The network of the future is the key to supporting the digitization and automation of many industries. This network should support diverse requirements from different applications using it. To do that, the network should have a new architecture. Which of the following best describe the elements of the new 5G end-to-end network architecture?

A.
Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud.
A.
Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud.
Answers
B.
Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access.
B.
Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access.
Answers
C.
Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element.
C.
Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element.
Answers
D.
Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications.
D.
Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications.
Answers
Suggested answer: D

Which of the following statements about 5G Transport is incorrect?

A.
Widely diverse end to end services will require the ability to create a Transport Slice with guaranteed SLAs.
A.
Widely diverse end to end services will require the ability to create a Transport Slice with guaranteed SLAs.
Answers
B.
Ultra Reliable Machine to Machine communication will require dependable low latency communication.
B.
Ultra Reliable Machine to Machine communication will require dependable low latency communication.
Answers
C.
Internet of things devices will require a massive increase in network connectivity.
C.
Internet of things devices will require a massive increase in network connectivity.
Answers
D.
Explosive traffic growth will require statically defined manually configured end to end QoS based services.
D.
Explosive traffic growth will require statically defined manually configured end to end QoS based services.
Answers
Suggested answer: C
Total 40 questions
Go to page: of 4