- All Exams Instant Download
What are the five key features of 5G Core?
What are the five key features of 5G Core?A . Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self- healingB . Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network SlicingC . Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network SlicingD . Control and User Planes Separation,...
What is Unified Data Management (UDM)?
What is Unified Data Management (UDM)?A . This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.B . This network function supports authentication for 3GPP and non-3GPP accesses.C...
Which of the following drive 5G low latency? (Choose two.)
Which of the following drive 5G low latency? (Choose two.)A . Support of up to 1 billion of IoT and sensors devices per km2B . Lower Time Transmission Interval (TTI)C . Higher spectral efficiencyD . Edge CloudsView AnswerAnswer: B,C
What are the benefits of the stateless or state-efficient aspects of network functions?
What are the benefits of the stateless or state-efficient aspects of network functions?A . Avoid massive database corruptionB . Provide real time access to the databasesC . Enable scalability and extreme resiliency in the 5G CoreD . Ensure the database integrityView AnswerAnswer: C Explanation: Reference: https://www.nokia.com/about-us/news/releases/2018/01/29/nokia-implements-future-x-network-architecture-for-5g-to-deliver-breakthrough-network-performance-and-reduce-costs/
Which of the following is a valid NFV attack?
Which of the following is a valid NFV attack?A . Hijack attack on hypervisorB . DDoS attack on the SDN switchesC . Poor NFV implementationD . Hypervisor resources leakageView AnswerAnswer: A Explanation: Reference: https://www.etsi.org/deliver/etsi_gs/nfv-sec/001_099/001/01.01.01_60/gs_nfv-sec001v010101p.pdf
What is the best solution for deploying an optimal network function distribution?
What is the best solution for deploying an optimal network function distribution?A . Using duplicated Virtual Network FunctionsB . Using Virtual Network Functions to control the routingC . Using Virtual Network Functions orchestrated across various Cloud Data CentersD . Using Virtual Network Functions in AccessView AnswerAnswer: C
What is the primary benefit of Edge Cloud?
What is the primary benefit of Edge Cloud?A . Lower latencyB . Higher AvailabilityC . Larger BandwidthD . Lower CostView AnswerAnswer: A Explanation: Reference: https://www.nokia.com/networks/portfolio/edge-cloud/
Which of the following technologies drive 5G increased throughput capacity? (Choose three.)
Which of the following technologies drive 5G increased throughput capacity? (Choose three.)A . MU-MIMO and beamformingB . Higher spectral efficiencyC . Network SlicingD . Multi-connectivity per User EquipmentView AnswerAnswer: A,B,C
Which of the following statements about Network Slicing are correct? (Choose three.)
Which of the following statements about Network Slicing are correct? (Choose three.)A . Multiple slices create multiple virtual network instances.B . Unique Quality of Service can be allocated to a given slice.C . Specific resources can be allocated to a given slice.D . Network Slicing is a way to physically...
Which of the following is not a part of an E2E Network Slice?
Which of the following is not a part of an E2E Network Slice?A . Cloud SliceB . Core SliceC . Access SliceD . Transport SliceView AnswerAnswer: A