SOAR can be seen as a tool for which of the following? Select the best answer.

SOAR can be seen as a tool for which of the following? Select the best answer.A . SDN intrusion control B. NFV overload control C. Security Operation Center D. IoT attack preventionView AnswerAnswer: D

January 16, 2023No CommentsREAD MORE +

Which of the following best defines what is meant by Network Slice isolation?

Which of the following best defines what is meant by Network Slice isolation?A . Security + Cloud isolation B. Resource + Security isolation C. Transport + Cloud isolation D. Resource + Traffic isolationView AnswerAnswer: B Explanation: Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case- Requirements-_-FInal-.pdf

January 16, 2023No CommentsREAD MORE +

Which of the following is not a component of a 5G Transport Network?

Which of the following is not a component of a 5G Transport Network?A . Fronthaul Core B. Access Backhaul C. Metropolitan or Regional Core D. Backbone CoreView AnswerAnswer: D Explanation: Reference: https://www.nokia.com/about-us/news/releases/2017/11/13/nokia-unveils-cloud-packet-core-to-enable-5g-services/

January 16, 2023No CommentsREAD MORE +

Which one of the following requires a network service package defined in a catalog?

Which one of the following requires a network service package defined in a catalog?A . Cloud software platform B. Cloud infrastructure software C. Cloud orchestration D. Software defined networkView AnswerAnswer: C

January 15, 2023No CommentsREAD MORE +

What will 5G bring in terms of supporting requirements of industry automation? (Choose three.)

What will 5G bring in terms of supporting requirements of industry automation? (Choose three.)A . Low latency characteristics in the range of 5 to 10 ms for High Speed Discrete Automation Applications. B. Low latency characteristics in the range of 0.1 to 1 ms for Video Monitoring and AR. C....

January 15, 2023No CommentsREAD MORE +

What is the purpose of the secondary authentication feature?

What is the purpose of the secondary authentication feature?A . To improve authentication between the User Equipment and the 5G Core. B. To improve authentication when connecting to different network slices. C. To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF). D. To authenticate the User Equipment...

January 15, 2023No CommentsREAD MORE +

What are the benefits of the stateless or state-efficient aspects of network functions?

What are the benefits of the stateless or state-efficient aspects of network functions?A . Avoid massive database corruption B. Provide real time access to the databases C. Enable scalability and extreme resiliency in the 5G Core D. Ensure the database integrityView AnswerAnswer: C Explanation: Reference: https://www.nokia.com/about-us/news/releases/2018/01/29/nokia-implements-future-x-network- architecture-for-5g-to-deliver-breakthrough-network-performance-and-reduce-costs/

January 15, 2023No CommentsREAD MORE +

What is the role of 5G in meeting the automation needs of Industry 4.0?

What is the role of 5G in meeting the automation needs of Industry 4.0?A . 5G plays a minor role on Industry 4.0 because the requirements are mainly focused on mMTC and IoT. B. 5G requirements for Industry 4.0 are mainly focused on Ultra high bandwidth needs. C. 5G plays...

January 13, 2023No CommentsREAD MORE +

Which of the following statements about Network Slicing are correct? (Choose three.)

Which of the following statements about Network Slicing are correct? (Choose three.)A . Multiple slices create multiple virtual network instances. B. Unique Quality of Service can be allocated to a given slice. C. Specific resources can be allocated to a given slice. D. Network Slicing is a way to physically...

January 13, 2023No CommentsREAD MORE +

What is Unified Data Management (UDM)?

What is Unified Data Management (UDM)?A . This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface. B. This network function supports authentication for 3GPP and non-3GPP accesses....

January 12, 2023No CommentsREAD MORE +