ExamGecko
Home Home / Nokia / BL00100-101-E

Nokia BL00100-101-E Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which one of the following requires a network service package defined in a catalog?

A.
Cloud software platform
A.
Cloud software platform
Answers
B.
Cloud infrastructure software
B.
Cloud infrastructure software
Answers
C.
Cloud orchestration
C.
Cloud orchestration
Answers
D.
Software defined network
D.
Software defined network
Answers
Suggested answer: C

What does the acronym SOAR stand for?

A.
Security Orchestration Automation and Recovery
A.
Security Orchestration Automation and Recovery
Answers
B.
Security Optimization Accountability Recovery
B.
Security Optimization Accountability Recovery
Answers
C.
Security Orchestration Automation and Response
C.
Security Orchestration Automation and Response
Answers
D.
Securitization, Optimization, Access Control, and ResiliencyAnswer: C
D.
Securitization, Optimization, Access Control, and ResiliencyAnswer: C
Answers
Suggested answer: C

Which of the following is not a component of the 5G Flexible RAN architecture?

A.
Radio Unit
A.
Radio Unit
Answers
B.
Distributed Unit
B.
Distributed Unit
Answers
C.
Centralized Unit
C.
Centralized Unit
Answers
D.
Optical UnitAnswer: D
D.
Optical UnitAnswer: D
Answers
Suggested answer: D

A company is planning to offer services to different cities worldwide so drones can be used to scan disaster areas to help identify victims' locations quickly, organize evacuations efficiently, and save lives. Drones will be connected to a 5G network. The company is planning to offer two applications running in the cloud – one to manage drones through remote control while the other offers live video streaming to drone operators. As a 5G professional, you are asked what are the network requirements for those two applications?

A.
The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.
A.
The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.
Answers
B.
The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.
B.
The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.
Answers
C.
Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.
C.
Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.
Answers
D.
The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.
D.
The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.
Answers
Suggested answer: B

What is the purpose of the secondary authentication feature?

A.
To improve authentication between the User Equipment and the 5G Core.
A.
To improve authentication between the User Equipment and the 5G Core.
Answers
B.
To improve authentication when connecting to different network slices.
B.
To improve authentication when connecting to different network slices.
Answers
C.
To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
C.
To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
Answers
D.
To authenticate the User Equipment with an external data network.
D.
To authenticate the User Equipment with an external data network.
Answers
Suggested answer: A

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)

A.
MU-MIMO and beamforming
A.
MU-MIMO and beamforming
Answers
B.
Higher spectral efficiency
B.
Higher spectral efficiency
Answers
C.
Network Slicing
C.
Network Slicing
Answers
D.
Multi-connectivity per User Equipment
D.
Multi-connectivity per User Equipment
Answers
Suggested answer: A, B, C

What are the benefits of the stateless or state-efficient aspects of network functions?

A.
Avoid massive database corruption
A.
Avoid massive database corruption
Answers
B.
Provide real time access to the databases
B.
Provide real time access to the databases
Answers
C.
Enable scalability and extreme resiliency in the 5G Core
C.
Enable scalability and extreme resiliency in the 5G Core
Answers
D.
Ensure the database integrityAnswer: C
D.
Ensure the database integrityAnswer: C
Answers
Suggested answer: C

Which of the following defines a vertical Network Slice?

A.
When it serves a given customer for a specific purpose, such as a national energy network.
A.
When it serves a given customer for a specific purpose, such as a national energy network.
Answers
B.
When it cross all the network layers from the radio up to the core.
B.
When it cross all the network layers from the radio up to the core.
Answers
C.
When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy).
C.
When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy).
Answers
D.
When it operates on the same layer of the ISO/OSI model.Answer: A
D.
When it operates on the same layer of the ISO/OSI model.Answer: A
Answers
Suggested answer: A

What are the benefits of traffic engineering in Transport networks? (Choose three.)

A.
Scaling access points
A.
Scaling access points
Answers
B.
Better utilization of network capacity
B.
Better utilization of network capacity
Answers
C.
Traffic steering
C.
Traffic steering
Answers
D.
Resiliency
D.
Resiliency
Answers
Suggested answer: B, C, D

Which of the following is a valid NFV attack?

A.
Hijack attack on hypervisor
A.
Hijack attack on hypervisor
Answers
B.
DDoS attack on the SDN switches
B.
DDoS attack on the SDN switches
Answers
C.
Poor NFV implementation
C.
Poor NFV implementation
Answers
D.
Hypervisor resources leakageAnswer: A
D.
Hypervisor resources leakageAnswer: A
Answers
Suggested answer: A
Total 40 questions
Go to page: of 4