BL0-100 Dumps

BL0-100 Braindumps BL0-100 Real Questions BL0-100 Practice Test

BL0-100 Actual Questions


killexams.com


Nokia


BL0-100


Nokia Bell Labs 5G Foundation


https://killexams.com/pass4sure/exam-detail/BL0-100

Question: 13

What is the maximum distance of an Edge Cloud from end-user? A. 1,000 KM

  1. 5,000 KM

  2. 10,000 KM

  3. 300 KM


Answer: A Question: 14

SOAR can be seen as a tool for which of the following? Select the best answer.


  1. SDN intrusion control

  2. NFV overload control

  3. Security Operation Center

  4. IoT attack prevention Answer: D Question: 15

What is the purpose of the secondary authentication feature?


  1. To improve authentication between the User Equipment and the 5G Core.

  2. To improve authentication when connecting to different network slices.

  3. To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).

  4. To authenticate the User Equipment with an external data network.


Answer: A Question: 16

What are the five key features of 5G Core?


  1. Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self- healing

  2. Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing

  3. Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network Slicing

  4. Control and User Planes Separation, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing


Answer: A Question: 17

Which one of the following requires a network service package defined in a catalog?

  1. Cloud software platform

  2. Cloud infrastructure software

  3. Cloud orchestration

  4. Software defined network


Answer: C Question: 18

Which of the following best defines what is meant by Network Slice isolation?


  1. Security + Cloud isolation

  2. Resource + Security isolation

  3. Transport + Cloud isolation

  4. Resource + Traffic isolation


Answer: B


Explanation:


Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case- Requirements-_-FInal-.pdf


Question: 19


The network of the future is the key to supporting the digitization and automation of many industries. This network should support diverse requirements from different applications using it. To do that, the network should have a new architecture.


Which of the following best describe the elements of the new 5G end-to-end network architecture?


  1. Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud.

  2. Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access.

  3. Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element.

  4. Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications.


Answer: D Question: 20

Which of the following is not a component of a 5G Transport Network?


  1. Fronthaul Core

  2. Access Backhaul

  3. Metropolitan or Regional Core

  4. Backbone Core Answer: D Explanation:

Reference: https://www.nokia.com/about-us/news/releases/2017/11/13/nokia-unveils-cloud-packet-core-to-enable-5g-services/


Question: 21


Which of the following statements about Network Slicing are correct? (Choose three.)


  1. Multiple slices create multiple virtual network instances.

  2. Unique Quality of Service can be allocated to a given slice.

  3. Specific resources can be allocated to a given slice.

  4. Network Slicing is a way to physically partition the common network infrastructure.


Answer: A,B,C Question: 22

What is the Authentication Server Function (AUSF)?


  1. This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.

  2. This network function supports authentication for 3GPP and non-3GPP accesses.

  3. This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).

  4. This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.


Answer: B Question: 23

Which of the following is not a component of the 5G Flexible RAN architecture?


  1. Radio Unit

  2. Distributed Unit

  3. Centralized Unit

  4. Optical Unit Answer: D Explanation:

Reference: https://www.hindawi.com/journals/wcmc/2019/5264012/


Question: 24


What functionality is applied by SDN to find an alternative path in case of failure in the Transport Network?


  1. Path Correlation Engine

  2. Alternative Route Finding

  3. Alternative Path Computing

  4. Path Computation Engine


Answer: C


Explanation:


Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwj01tmp5uTvAhUQO8AKHbvUB5c QFjAAegQIBxAD&url=https%3A%2F%2Fwww.mdpi.com%2F2071-1050%2F12%2F10%2F4255% 2Fpdf&usg=AOvVaw2Jd6iravRnpP8tfxjIdKWK


Question: 25


How many slices can a User Equipment be connected simultaneously with 4G Core based network?


  1. 1

  2. 8

  3. unlimited

  4. 4


Answer: B