What are the five key features of 5G Core?

What are the five key features of 5G Core?A . Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self- healingB . Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network SlicingC . Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network SlicingD . Control and User Planes Separation,...

May 12, 2021 No Comments READ MORE +

What is Unified Data Management (UDM)?

What is Unified Data Management (UDM)?A . This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.B . This network function supports authentication for 3GPP and non-3GPP accesses.C...

May 12, 2021 No Comments READ MORE +

Which of the following drive 5G low latency? (Choose two.)

Which of the following drive 5G low latency? (Choose two.)A . Support of up to 1 billion of IoT and sensors devices per km2B . Lower Time Transmission Interval (TTI)C . Higher spectral efficiencyD . Edge CloudsView AnswerAnswer: B,C

May 8, 2021 No Comments READ MORE +

What are the benefits of the stateless or state-efficient aspects of network functions?

What are the benefits of the stateless or state-efficient aspects of network functions?A . Avoid massive database corruptionB . Provide real time access to the databasesC . Enable scalability and extreme resiliency in the 5G CoreD . Ensure the database integrityView AnswerAnswer: C Explanation: Reference: https://www.nokia.com/about-us/news/releases/2018/01/29/nokia-implements-future-x-network-architecture-for-5g-to-deliver-breakthrough-network-performance-and-reduce-costs/

May 7, 2021 No Comments READ MORE +

Which of the following is a valid NFV attack?

Which of the following is a valid NFV attack?A . Hijack attack on hypervisorB . DDoS attack on the SDN switchesC . Poor NFV implementationD . Hypervisor resources leakageView AnswerAnswer: A Explanation: Reference: https://www.etsi.org/deliver/etsi_gs/nfv-sec/001_099/001/01.01.01_60/gs_nfv-sec001v010101p.pdf

May 7, 2021 No Comments READ MORE +

What is the best solution for deploying an optimal network function distribution?

What is the best solution for deploying an optimal network function distribution?A . Using duplicated Virtual Network FunctionsB . Using Virtual Network Functions to control the routingC . Using Virtual Network Functions orchestrated across various Cloud Data CentersD . Using Virtual Network Functions in AccessView AnswerAnswer: C

May 4, 2021 No Comments READ MORE +

What is the primary benefit of Edge Cloud?

What is the primary benefit of Edge Cloud?A . Lower latencyB . Higher AvailabilityC . Larger BandwidthD . Lower CostView AnswerAnswer: A Explanation: Reference: https://www.nokia.com/networks/portfolio/edge-cloud/

April 30, 2021 No Comments READ MORE +

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)A . MU-MIMO and beamformingB . Higher spectral efficiencyC . Network SlicingD . Multi-connectivity per User EquipmentView AnswerAnswer: A,B,C

April 29, 2021 No Comments READ MORE +

Which of the following statements about Network Slicing are correct? (Choose three.)

Which of the following statements about Network Slicing are correct? (Choose three.)A . Multiple slices create multiple virtual network instances.B . Unique Quality of Service can be allocated to a given slice.C . Specific resources can be allocated to a given slice.D . Network Slicing is a way to physically...

April 28, 2021 No Comments READ MORE +

Which of the following is not a part of an E2E Network Slice?

Which of the following is not a part of an E2E Network Slice?A . Cloud SliceB . Core SliceC . Access SliceD . Transport SliceView AnswerAnswer: A

April 28, 2021 No Comments READ MORE +